Analysis

  • max time kernel
    131s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 00:28

General

  • Target

    e4cc77d1bb798367aeae40d6cc54f69b6326b7faf249323f49b993aa3f32c00b_JC.docx

  • Size

    121KB

  • MD5

    b4dbd4f66804dc194f2626c4e5811708

  • SHA1

    448f02dc8007563984690acd31fc408698b9245c

  • SHA256

    e4cc77d1bb798367aeae40d6cc54f69b6326b7faf249323f49b993aa3f32c00b

  • SHA512

    c10add32bed935a9b9d748187e8ab773efbdd35bf9d24e1fc86f97b2fa21635039c2f337961baffee3e2d50a16c0491dc0eecff047079ffca1e1297401db5110

  • SSDEEP

    3072:1O9hanjt/xMJzfzzZXS8tNrPnufXCS9lj/h9bZWfn:E9happmDzzoNF9Fe

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e4cc77d1bb798367aeae40d6cc54f69b6326b7faf249323f49b993aa3f32c00b_JC.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d22f9d1f776a4dd562fc78e262fc6908

      SHA1

      10c6786605880533505074c4270147c32f651bda

      SHA256

      2b405c5420f1ee3a541da551d9d8dba73a90fc14e8e476999198877792325c0d

      SHA512

      d49e62cefabfca20c5648d0f7f029c5e2d9c34861a5d367f8771636451cf6f99eb20fed2208ad6a1f3c0c0fba191b57e18958aff24997e5530c3555614037e0b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{FEFB1426-CC6E-468E-BCF6-28D621CE85B0}.FSD

      Filesize

      128KB

      MD5

      b189fc69530811708793e952ec49b542

      SHA1

      d4f984bae929e509c658c64cb4ffebce392e2545

      SHA256

      374d102b8fdd5e4fd7f3caae570ecd4ba5e241b95284759704f110ecb0812a4f

      SHA512

      b12bc2b425314936624f2b2334e099276a8824d8929f0a51d0038466c785c3ae7641e6c0238ca9794e84594696a1ceb0905d8a943176f7921a648503f99a50f3

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      35682f6d20dabe616d140231b896c7f4

      SHA1

      6e0aacc230e122db5140b2392fa9bead0b1b19ad

      SHA256

      c14c26106a633fa62291f4e6bc006061b3ec7aad8a83bf52c39b66ec4933a1c2

      SHA512

      ead1e319e0a7875698dd635164bb0016b85e61bb040f7876a9fdcceb2720e27d64a017ba55e06a006a6b9dc1fd74882472f5b31126ed21763649f0c920a03d1f

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{3F7F5340-836C-42F2-BD0F-5EA41A520B32}.FSD

      Filesize

      128KB

      MD5

      b7897c31f23ecfc22db4c0819d052b7b

      SHA1

      8d15acaacb6ce511b775409735afdf2a1d6dda19

      SHA256

      3a2070952352545a533f8024f02ec5d05c5e0cbb4aff056c493e39bb9d7847a1

      SHA512

      334567717c1385277843f53397e9ee76d0f3bf282a4622acc34f163d508454be5e6af673e4c047da0442b251c50760e097d9a3152bec8bd8c688a5266effe12c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2AA1E05C.emf

      Filesize

      12.7MB

      MD5

      8eccbe333b4c034f39eece1807b1e4e9

      SHA1

      183690242103eeffe2508e8c3df8fb912d483987

      SHA256

      390cb5341399e82f6b6ceb29f9c0d78b07f7cb61c1810a9cc753506ad5b3fb99

      SHA512

      7034809bac73cf0cff3f59be33649dedca7a35a21f39868974af4af6322765d3fb4e3354ed9290d29b43ec11b9b27d3aad7259416c43d55517cb4c85e0815930

    • C:\Users\Admin\AppData\Local\Temp\Cab9BB6.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar9CD2.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\{BA010062-3024-461A-8F55-C9014B80FB37}

      Filesize

      128KB

      MD5

      30e2928893ba4fe9e1870732b0389c39

      SHA1

      685ee3537440829374d7613ececaa437223ef0b3

      SHA256

      f5cbda8b71843a077ddef5c30b89e14eb2980289406324230b92d4a76c792d52

      SHA512

      2bc983ae69e4322f77813a9dbac5d07cdbca4ad2be678635f1cc5642479892b8450cbc6b05df6f70c0bd31372a00688737280d8904af8b4ce2098dc12c3105b2

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      2754acbe1552562a9aa4e0973adb76f0

      SHA1

      74d07c09a705d767f23c342dc723751876a41acd

      SHA256

      c0a6b4ac96cb0da8a259f065ba48ffc0b46ac3b3fdf608ca675943c49320ad80

      SHA512

      7080f1eaa8758efea917d65e4f195926479bf483c1fb27dd2b111c3cb578b9d8cdd40b01999cd67ca8ce601cc435c582761401046fa977a9bf68777e58b25292

    • memory/2428-0-0x000000002F8B1000-0x000000002F8B2000-memory.dmp

      Filesize

      4KB

    • memory/2428-2-0x000000007178D000-0x0000000071798000-memory.dmp

      Filesize

      44KB

    • memory/2428-139-0x000000007178D000-0x0000000071798000-memory.dmp

      Filesize

      44KB

    • memory/2428-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2428-176-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2428-179-0x000000007178D000-0x0000000071798000-memory.dmp

      Filesize

      44KB