Analysis

  • max time kernel
    130s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2023 12:56

General

  • Target

    July Tom-P _Updated SOA &Inv_989220091.docx

  • Size

    10KB

  • MD5

    c1bb23528828ff09426a115719ae2c0b

  • SHA1

    ce26c7b8620aac8878f955cee07446b0524762d4

  • SHA256

    f0aa6b9817763911158118b843fe4859cd6314617dad97b350f755fd60a28343

  • SHA512

    7b3d79b762f36b0ebdb9df8af4fe5a356d5abd7cf6cd7d25e63a1c2b435206fe4ba5f02b2bc42d2e75f706411bd1947d9b7cfa87108d0a9a00be3b2c1c852b54

  • SSDEEP

    192:ScIMmtPx+nj5G/b1rVpnOjn22W5TNcQDxthYSLg3m0R:SPX5KcZObrhILhYSLAm4

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\July Tom-P _Updated SOA &Inv_989220091.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2992

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{FB692B83-D3AC-40D5-AB94-1C4AA11F0433}.FSD
      Filesize

      128KB

      MD5

      9fa388214a1eca7d0f9fbe2feee44510

      SHA1

      e312d110e631426dbe7e361e3afd16982cfc4fba

      SHA256

      a8ef6dd658790495d58a244854838c3c7ee4ec41ba1a4759bae656b504222440

      SHA512

      df05d02a577da6aa24ddd87c1f10287d94a95836e5501a47091f3f4dcdc5d83bbf5568ee27aea44c46c51e3b27485fb58e47eef279c91b0ee1ac7eb94f9d93df

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      49da0481c45b886884e85da64358b320

      SHA1

      b5d51f168ef27ec86c2ec55858118ed200376128

      SHA256

      6c6a71f92b9709932f633075c608372bf63db3bbebd7efdd146671ff65d19cb0

      SHA512

      23001d15fc5ddee2dcca868d13c5a7438abf4e2ac323ef6a389d50925e8480fa67b7385da95006e0ac6da09e46d15dcdf701df46e036e5aaea67cfaa82017a07

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{46BAA0A6-704A-4E58-B8FF-5D5456F70E01}.FSD
      Filesize

      128KB

      MD5

      e213b7ce0f928855b66f7bd8c5dbc250

      SHA1

      e853cc182bc39da295ddf0b8ff52a9018a232215

      SHA256

      94da1a04a33460abc12910b69f193757e8340a74c7cce17a2192af7b9c07ea05

      SHA512

      ccef099c7262c9d56c88b7ebd9dfc743ea50a0162a24ba639dae62542639ee9e2cbebc4318fad8c080fd55c1b710b71cad8ee1545bd6f18cd695e62c8ed95ddb

    • C:\Users\Admin\AppData\Local\Temp\{10F7A3B1-2739-4F77-BB1F-7920CF689849}
      Filesize

      128KB

      MD5

      6a9c41d63233f3d65221f6c1c35c13c1

      SHA1

      16f7f079d8ec56aa62273b4617acee4de7126252

      SHA256

      0fa9fa44e60f0dee43f58c78ff1e260dac25e3c5af2c95291d9d548ef6351a09

      SHA512

      43072fced228dffb7e8d9d3b321650c99912ebd3621ee8c2af3ddbb3ca1b8ab9b57477cf600efc654091e2f61a0b26a554dc92c92a50fad2ee22f3fa45c1aa7e

    • memory/108-0-0x000000002F4D1000-0x000000002F4D2000-memory.dmp
      Filesize

      4KB

    • memory/108-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/108-2-0x000000007136D000-0x0000000071378000-memory.dmp
      Filesize

      44KB

    • memory/108-68-0x000000007136D000-0x0000000071378000-memory.dmp
      Filesize

      44KB