Analysis

  • max time kernel
    1744s
  • max time network
    1564s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2023 02:26

General

  • Target

    Challenge_FIles/Employees_Contact_Audit_Oct_2021.docx

  • Size

    12KB

  • MD5

    d5742309ba8146be9eab4396fde77e4e

  • SHA1

    8aaa79ee4a81d02e1023a03aee62a47162a9ff04

  • SHA256

    ed2b9e22aef3e545814519151528b2d11a5e73d1b2119c067e672b653ab6855a

  • SHA512

    37367ea06191c8a949f6c092bc4137736b344cc9892bf8a19e149557919d9276fb1301009a700cede0f2ca05d6827c827992817aee7b8968a5429e433fe0c8ba

  • SSDEEP

    192:60L6GkWglL+bzW6mlHRrZu87Fym3tZknRIhRHNwC3Eo+ETdlexwDvx/jVm9CoDFn:603kpLTZJHm+Eo+ETd4weCoDFLFd

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Challenge_FIles\Employees_Contact_Audit_Oct_2021.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:676

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{D2AC2EDD-0EBC-489F-B316-7923A3467D9A}.FSD
      Filesize

      128KB

      MD5

      8260cd7fac5ed55ad0709dd22b06a12e

      SHA1

      c2f743686c4cccb5d7eeb072be81ff45a6c8660a

      SHA256

      2944c8f2e71610b3d6ce3f438ab60b0e0071b7b8b000a9f6ef09253e36b99708

      SHA512

      602023c7c1e991720a2560217e31ec38769be5aed743803cb8ee5854a11d6576e469a0d7c2a6f7800de239a9ee2295d1a8c4a0db9ecdc0ec58c2d2e980b5922f

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      f8b56819858e08d7f017bb5e139fab89

      SHA1

      aaa778642ab53c0e2f7af5e57186a8bd3267cb59

      SHA256

      695194b1026c843c0bf841ee801626574d93c853d1b17b7cfef7246f6e7a4000

      SHA512

      a1fa45222910786b5b8a2a58fca1a36efb15eb06517ad2a1c6bd2dc67ff2584a0cb310d6f87d2b171886f6a907c33ef837eefec38194aa40244a0b2a7a35d509

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{72DBB91E-985B-48FA-B28B-48639C2AB898}.FSD
      Filesize

      128KB

      MD5

      6fe6d2c3acc2a8200bbe3d419f718e18

      SHA1

      d8be872b54d9c158b12731ee454d9796549827ba

      SHA256

      dea647cea8f717a430abfc2864eb7c2dfc16d7d1f8c8b0927c07eb1daa04b33e

      SHA512

      abf5c9be944214e3dba350147bd12300367cd734da22393d67ce9108843743b5cd1926be729cbfde62717fae05f70cb4af4b45a36c6f4b434d69ac06721fc7ec

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\21D50692.dat
      Filesize

      52B

      MD5

      07ffeff17a8a1a1209ab3c2690d569d4

      SHA1

      37cb513fabddcdbbaa2e7296b31a4bc9832e1b01

      SHA256

      57cfa30bb860b95b7012ed62427025959b671d270aaf67fc406fbc3c4f3c48d4

      SHA512

      743591e7bfe9936eee057c9d1769595d48c90ba28057d8ebd0f7299b8fcacd7b8fa50af30bd0b8b6e09f77ade16b47d6f0abb079d60e975443a57c514099ad86

    • C:\Users\Admin\AppData\Local\Temp\{A6EE4E87-D621-4485-8263-AAD51699E83B}
      Filesize

      128KB

      MD5

      0f60ad4636f7f72547c4d7bfa01cb2a2

      SHA1

      3c70acf9b1cd02dc44a54023a340c2f624db30ed

      SHA256

      af41fc04988f18f31f7752376bb5043bdaf133f7fd887d43eeb024546458421f

      SHA512

      6bb315504c3b68e8dc7f8348c144c5804ccc16f31825dc8b645d9614e5681d772b8c5118357a591f20cbd54cc79e76c19b9bd9e080b9505ce086ed53df8ebf54

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2232-0-0x000000002FD71000-0x000000002FD72000-memory.dmp
      Filesize

      4KB

    • memory/2232-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2232-2-0x000000007117D000-0x0000000071188000-memory.dmp
      Filesize

      44KB

    • memory/2232-10-0x000000007117D000-0x0000000071188000-memory.dmp
      Filesize

      44KB