Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2023 08:52

General

  • Target

    Challenge_FIles/Work_From_Home_Survey.docx

  • Size

    26KB

  • MD5

    41dacae2a33ee717abcc8011b705f2cb

  • SHA1

    4b35d14a2eab2b3a7e0b40b71955cdd36e06b4b9

  • SHA256

    84674acffba5101c8ac518019a9afe2a78a675ef3525a44dceddeed8a0092c69

  • SHA512

    11f7177dc3c8a804ff6450477e15aadd20fddac98205008db25a4f6ef69a54b7cb7c9dd0d7bdf1b1d317f306482d86ad5ef150530194de7d8dbe344203962648

  • SSDEEP

    768:8HVoVneOa0HD/vb9EVoiJWq8UCei96T8vuX3m86RAFvg5e:8QVvbvb9wnIq8OitP88eY5e

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Challenge_FIles\Work_From_Home_Survey.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:568

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{D9460422-8A45-4B60-AA82-15A4138A2E16}.FSD
      Filesize

      128KB

      MD5

      438b691866da2264744302a907f2104f

      SHA1

      3093a21d3ce9f5afc5c2e9ec9cbe4c0b00eebc9c

      SHA256

      19779081e7223ddf1f7d9ffc6e5d3dc06a58c0fb63fcd7cf800aa4fd48e841be

      SHA512

      3b8245a438813153c6e316ed8f796a9bf7201d9791c8e1ae53e6047bb08cf14be4955724825d007fd79183a81d986aca59787ca242493d25416fa9637537dc58

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      f2b23bb9fd99cbc5af1a5fb4f3767217

      SHA1

      e84df039123d7dc78d084559efb886a377e51103

      SHA256

      52fedd1bb4dce9634303b5cfcc400aa19c890591619fa936a910a00b54b2c2db

      SHA512

      5635bca5fe9445b04cec9f1aee5194e44e3f39ddde6f2d3751e13814b7dd689c40e5b360fa3b6859b667ead2a1b2739987a8be7b431f0c6be94428ed64c0f0fd

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{8EA860C3-C6BB-4435-8286-E3EB883BFD31}.FSD
      Filesize

      128KB

      MD5

      b6f93f5a49d76d28fee3da35100f52ee

      SHA1

      339437fca30530890e5c0353f7416969caabe371

      SHA256

      b55aaee1134af68e5bd57f6ffbd0a43e1119dffaf366ea7dcd5e0f25cdb6b2a2

      SHA512

      0bca29903d81b25b98bb52caa67fd0dcf68943c79dbbfc9dd086c0cc69f8a9531206b32be6973bd10765b25648e0f60f18522e2319473a1de46fe2b7266350b8

    • C:\Users\Admin\AppData\Local\Temp\{7794F367-833C-496A-AAFC-B30EF3A4D627}
      Filesize

      128KB

      MD5

      913601c1b31ede4b4e06002bd0886652

      SHA1

      53fc8fbe36df54a8afdfe66fae7cdd7bde526c14

      SHA256

      d57814f09a216de22a3d7bd7e7c51d03c4721e263ba3c1c88554af3a35c348c5

      SHA512

      38bb09f086618b0b7bc11e138d776f4e02eaf250cd178fe5b07fb2904180752db93395862791b03ad831307916987a80e6defdbda988d83034bbf8dda55ebd8e

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/1692-0-0x000000002FDA0000-0x000000002FEFD000-memory.dmp
      Filesize

      1.4MB

    • memory/1692-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1692-2-0x000000007165D000-0x0000000071668000-memory.dmp
      Filesize

      44KB

    • memory/1692-63-0x000000002FDA0000-0x000000002FEFD000-memory.dmp
      Filesize

      1.4MB

    • memory/1692-65-0x000000007165D000-0x0000000071668000-memory.dmp
      Filesize

      44KB