Analysis

  • max time kernel
    300s
  • max time network
    266s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2023 04:42

General

  • Target

    Challenge_FIles/Employees_Contact_Audit_Oct_2021.docx

  • Size

    12KB

  • MD5

    d5742309ba8146be9eab4396fde77e4e

  • SHA1

    8aaa79ee4a81d02e1023a03aee62a47162a9ff04

  • SHA256

    ed2b9e22aef3e545814519151528b2d11a5e73d1b2119c067e672b653ab6855a

  • SHA512

    37367ea06191c8a949f6c092bc4137736b344cc9892bf8a19e149557919d9276fb1301009a700cede0f2ca05d6827c827992817aee7b8968a5429e433fe0c8ba

  • SSDEEP

    192:60L6GkWglL+bzW6mlHRrZu87Fym3tZknRIhRHNwC3Eo+ETdlexwDvx/jVm9CoDFn:603kpLTZJHm+Eo+ETd4weCoDFLFd

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Challenge_FIles\Employees_Contact_Audit_Oct_2021.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1596

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      2c5f57fae5b27cd39612766d89097c31

      SHA1

      3e77dfd536730f1b2a30e1f96a426cf2118d1a60

      SHA256

      bc665ab21f67ab48cda35d16c606ae737a20519d21d50c6180c609824b59106a

      SHA512

      042e2a24896cc8da8b964a86b6490f349767b3340f1eaf9fbe0336d25e12bb3c357a7c0d8936470c78e48595caef1e0c682a606823df3e18aa941e5d8d0da7cc

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{46FDD15D-4750-4377-A6A6-810F578EF8CE}.FSD
      Filesize

      128KB

      MD5

      53ca8619cee903ad09af7d6c234ae33e

      SHA1

      d1b95a71dac58f29248c8a75a104db59f8d17e0a

      SHA256

      cf698b8173e86ff5e01bf0db268d101af167627ab750f9bb89b4097235607ec0

      SHA512

      df7d669ce9f2ec0a8c2d78732d68a5712bd6da804c2689884388ad70b3a132499b794648eab41f67e77fce66d783732f0cadd5189a6320ad7e21404985c9726d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JXO65VIN\note[1].htm
      Filesize

      8KB

      MD5

      064c4d10430072833b6b65b2cce02cf3

      SHA1

      45c600e484875f7d8b5b8692f250975d6652e331

      SHA256

      5fc8fe9f3743c5f36080525dd12c62f7da4d6ce590772e2aa41be879f67cd575

      SHA512

      e59c82c735d7448a92e066db38b951bcbcafa637396fb9327ca186cde9cb87400a2b0a56f741d706c2567061583a137da171537a27207db217b7f8788b7b9531

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9DEC10EE.dat
      Filesize

      52B

      MD5

      07ffeff17a8a1a1209ab3c2690d569d4

      SHA1

      37cb513fabddcdbbaa2e7296b31a4bc9832e1b01

      SHA256

      57cfa30bb860b95b7012ed62427025959b671d270aaf67fc406fbc3c4f3c48d4

      SHA512

      743591e7bfe9936eee057c9d1769595d48c90ba28057d8ebd0f7299b8fcacd7b8fa50af30bd0b8b6e09f77ade16b47d6f0abb079d60e975443a57c514099ad86

    • C:\Users\Admin\AppData\Local\Temp\{7191FAB5-4CEA-4DDF-B240-9D1DC7407C0D}
      Filesize

      128KB

      MD5

      de5d4d905c88900e026b2e47c56798bb

      SHA1

      d0f492da9b4f9479eb332f34fd58fa2d60cb0a2f

      SHA256

      f5e16c48e80637750414403d3c5c8b84e2c8451d2d0a72b2dca5346ca9f952fd

      SHA512

      c28df0f4086a4f89164cd5b23d71043bc79eb83fa18214471d0d8995b2debb095618343289b42795b0bfbb4ca6bdc66b8c34eae65f1e680ed6416492ea15f9e0

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/1164-0-0x000000002FAC1000-0x000000002FAC2000-memory.dmp
      Filesize

      4KB

    • memory/1164-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1164-2-0x000000007110D000-0x0000000071118000-memory.dmp
      Filesize

      44KB

    • memory/1164-3-0x000000007110D000-0x0000000071118000-memory.dmp
      Filesize

      44KB