Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 10:35

General

  • Target

    sample.docx

  • Size

    10KB

  • MD5

    52945af1def85b171870b31fa4782e52

  • SHA1

    06727ffda60359236a8029e0b3e8a0fd11c23313

  • SHA256

    4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784

  • SHA512

    58849f65d1ef86eacb905569919975d88094e075f6cd23efc4b481ad17af2c475a9834178f3ffcb4cd3ac984d21ed8dc1919141133c19fd647ca48a8d3e2b183

  • SSDEEP

    192:AEhM7fIUU09264wptGheab8h7Z/c+8poF1d3jvvtl59rGxjPQDasYBcG7h+:AqWfIz092hwLGAabkcfa7pr1lzyxjPQ9

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\sample.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bc57b02ecbef5f104ea5699deaba1566

      SHA1

      e45a3773ef850c31a5d4e021245944560e6604eb

      SHA256

      7403c15c8bbf7c6f0e22d4bcdc73c998571aabf93c02b91ff427af7ebae0a9a1

      SHA512

      1056f75f0f4428c9db064a8eb692ab4a62c7f905f53d5220a402e65edc28a52c1d4934f1e2edcf5da4e52cf618e1436489a10d3788dd7c6e67404527ea115ddb

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{2A2BCC95-91C0-4775-B6B0-B05AB4C6FEC6}.FSD

      Filesize

      128KB

      MD5

      f9e5fd15b39c714d50047bc6f453feb6

      SHA1

      48ae3e1ddece26280924a67dbaa8b2be04025d32

      SHA256

      ee4ba3d3759a8e28c34867ed5ee64af6b8cbf1925038d310601cc220754abc18

      SHA512

      87a1cfdfbfd636532ac7f62bbbebeb5b30ba9009a6c4fc887665431e37d845b7665903aa586d52f254a346199c6a8309ecbbcf53a77a9a61ab2b44b8b372c3c8

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      17c0496e26c0829503dcecd5ae95bbe2

      SHA1

      c2dda4935f67b3c99698ac31c2a47e0207bb51ea

      SHA256

      0082a85dbf0b1611bf33028d7ee6362a6ec9fd6a19e955cb0ef6cf01836f331e

      SHA512

      47dcf337ccec794678776fdffcf30c1d1662bc961a004d457f3c777d16cedec715ad4124830c4149f5efcb06b020395500adf8617fd806f94a9b8f4f35762701

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      17c0496e26c0829503dcecd5ae95bbe2

      SHA1

      c2dda4935f67b3c99698ac31c2a47e0207bb51ea

      SHA256

      0082a85dbf0b1611bf33028d7ee6362a6ec9fd6a19e955cb0ef6cf01836f331e

      SHA512

      47dcf337ccec794678776fdffcf30c1d1662bc961a004d457f3c777d16cedec715ad4124830c4149f5efcb06b020395500adf8617fd806f94a9b8f4f35762701

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{405B89B8-49DE-47AF-8E42-6515CD49B10D}.FSD

      Filesize

      128KB

      MD5

      6ced41e3e346d7388c697e4c62aa5eab

      SHA1

      c92325fe2949c1b0d154502e5ca635939a6c5efd

      SHA256

      bb4bc2680215280fdec07292a0466a9672a5b1d6328765a437f81f5d80f14e9b

      SHA512

      841e2ac1711fca7f941218496e132cfc33ec7f7a9403c3a3feb5bf064a7bdddf7343920a1a7aaf07b8f4598fdafdb894d82e95434d048a64e9163f55e0bfe295

    • C:\Users\Admin\AppData\Local\Temp\Cab45D9.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar4743.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\{41CD5138-2852-4A9E-991E-7FD171C50B2C}

      Filesize

      128KB

      MD5

      51faaf080bfd1eea6096d1966443f6ef

      SHA1

      428a5e1a141173fa51b16589348bd605b2e71a0b

      SHA256

      bbe97af28adddcabe7005d4eb42100c0d04b9860750ec408bd6c3550e6647eab

      SHA512

      2296a4af6b9958da1888df7c06082c9d07caf50091847970ff84a5fee50e233027700533d5d10b1d0c09849b812b7473a5de70502dccacf3d091acbd3370bbac

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      f7a553c14b5bba43de5deba8fbfeb717

      SHA1

      59ec71f577fdcdd6bd456f66ce88848a5814416d

      SHA256

      d818538eab08e7a8bce0c4c50364bcf2c403b2735f17d801ff5d577824b6a374

      SHA512

      d4008330be8a74a75c75553f7cdefe0fb32412b028e116767b060232e2cfcd7dfabf9134fd9f8ba6bd375875b7f6d4eb9df9c211135761959640754c0288cc91

    • memory/3044-0-0x000000002F9F1000-0x000000002F9F2000-memory.dmp

      Filesize

      4KB

    • memory/3044-2-0x00000000710FD000-0x0000000071108000-memory.dmp

      Filesize

      44KB

    • memory/3044-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3044-140-0x00000000710FD000-0x0000000071108000-memory.dmp

      Filesize

      44KB

    • memory/3044-213-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3044-214-0x00000000710FD000-0x0000000071108000-memory.dmp

      Filesize

      44KB