Analysis

  • max time kernel
    314s
  • max time network
    319s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2023 04:42

General

  • Target

    Challenge_FIles/Work_From_Home_Survey.docx

  • Size

    26KB

  • MD5

    41dacae2a33ee717abcc8011b705f2cb

  • SHA1

    4b35d14a2eab2b3a7e0b40b71955cdd36e06b4b9

  • SHA256

    84674acffba5101c8ac518019a9afe2a78a675ef3525a44dceddeed8a0092c69

  • SHA512

    11f7177dc3c8a804ff6450477e15aadd20fddac98205008db25a4f6ef69a54b7cb7c9dd0d7bdf1b1d317f306482d86ad5ef150530194de7d8dbe344203962648

  • SSDEEP

    768:8HVoVneOa0HD/vb9EVoiJWq8UCei96T8vuX3m86RAFvg5e:8QVvbvb9wnIq8OitP88eY5e

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Challenge_FIles\Work_From_Home_Survey.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2460

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{7D5CBA80-69CB-4E88-A574-9D1C49F89AC8}.FSD
      Filesize

      128KB

      MD5

      4400c3ff6e1b9db226ff0794571f72c7

      SHA1

      0a0b5afbc2da704d1317bff4cc2a3657f704c466

      SHA256

      7ab7742b0d439fa286b0b11c3769b443ab23af3e077c58ee9061883b4e0d759a

      SHA512

      e7cea7f268617723f4a51cda25e36be89ced1ffd9c5585bf1568dbbf1c5a9bc47c077e00a6812c8e6f9222bde78a36b8748173d2b171bbbf2ee8aaf060e41610

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      17092b8642339b331babf708fd1dc1fe

      SHA1

      f0e32c4f6956f05cd218f7bc4dda9778e0f8a957

      SHA256

      67480b862b9a412b6d9d1adaed03127ff6a1cd0047da691140e19e1e447e0ca4

      SHA512

      bdd200cb59087a85c4fd99798d3dbc71a320f13c3d6851802abd1c7fd2677d548d670c992e23ad6397adf1e479ecc0a8f1e65812877f920f4f7379e8af407235

    • C:\Users\Admin\AppData\Local\Temp\{A6A3EAC8-CCEC-4587-B784-AA632930F0DF}
      Filesize

      128KB

      MD5

      d86d7b918af29639f8baf72149c4d33a

      SHA1

      edb9ca4b453172a51283a94b2094c5e7fa25ee26

      SHA256

      123e7169ff46f4452b363216019657eccc9177dc583666430455d5efd1560699

      SHA512

      fec69a27de644844a7c755dca74a4e0f9dc1297e07d69a7f0993ad26274aba38964502310af05ce330c081bf95493c26f62571d982e553ad031ad666e1066661

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      386fbffa5b1104f6f695fbc57fcfedbe

      SHA1

      e5a38e79aabd8fae66ec80d9173e097ac61fd000

      SHA256

      aa4be04765929684531936718fe8aa171764fcbe941e5e3475e9c160b14d493b

      SHA512

      a21dc701fb9f4ec04194a7c7839a975313d4850164de573905849b31c917df71b21ab12dd89d84ca0e6cff619c6969f50fe3e8e0007bef49300e1f26a58e0425

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/3004-0-0x000000002FF81000-0x000000002FF82000-memory.dmp
      Filesize

      4KB

    • memory/3004-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/3004-2-0x0000000070CAD000-0x0000000070CB8000-memory.dmp
      Filesize

      44KB

    • memory/3004-62-0x0000000070CAD000-0x0000000070CB8000-memory.dmp
      Filesize

      44KB

    • memory/3004-101-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/3004-102-0x0000000070CAD000-0x0000000070CB8000-memory.dmp
      Filesize

      44KB