Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2023 11:45

General

  • Target

    dc926dae8c073f7f527fdda4396efc57.docx

  • Size

    10KB

  • MD5

    dc926dae8c073f7f527fdda4396efc57

  • SHA1

    9a5e5a6ca752b4a8e54c8a2139967ac6e8303016

  • SHA256

    55c6f4b4dbe4133fed8c9a7afa44b780f833dee877ac4d633b6c50e72fa0de94

  • SHA512

    fbc43b95f01f0477dafbc5b4e7a876176b11e941d12f9d96f821dc0d571994f12c64108ac76d6a54f492add9cf1a804fbf721648eb7571df5819867f66c6a147

  • SSDEEP

    192:ScIMmtPVG/bD1YafOOgHgb5SEzBC4vNqW603rN:SPX4D1YLOSKhlqaZ

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dc926dae8c073f7f527fdda4396efc57.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2940

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{2DBE8372-EC86-46BF-83A5-B9C7B8B65527}.FSD
      Filesize

      128KB

      MD5

      224d805e89e45b3522a2b07a8560e923

      SHA1

      157f6b510af2ddfa4509265d8daf31cb224ae333

      SHA256

      87096bcfeed8746c1e63c9561e8e25fb5f958c811d10a939f40c67eed5715b11

      SHA512

      170ab2b46e26bcd6dc5dfed271e2e0f62df0462c47ea850ac5c08e897063c6909c5a2439fae4f469e688d334763b8b2bc9a103e26c99c0e01e42666846f7dbfd

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      1b2e69182b913366c83cb5ce4752e646

      SHA1

      4c20ae1f9cf96ddf1a3adcddb2a4cb5313c904b8

      SHA256

      1af44845cc155088ce8b1f889e607d7400a45d01c65323c84ab669a792b7c3cc

      SHA512

      2bbfa7d54786527cdb1216c23edc2f03742dda6f3f8babcece572b1bc09f042b9e10b9257a61aad5f4c1b401c6eb6d4c32870c9ca6e055c0c9cf64a77c9c7a61

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4R90HQQX\2js32[1].htm
      Filesize

      1KB

      MD5

      1ef5a947fb11b2da08a57162ecf917ab

      SHA1

      c4718f76bf5e6b0a33910ca7cf4b8958f673888f

      SHA256

      cbacbbc41fe816d88d13a9c20818fe216e65dfc1f10ab6c135a465331af0b30f

      SHA512

      5ebd5a240d92bf1e51eb4b0e6bc166b167ed22207f2355709953c0297c80c0e8be58ce90b880350e28de6695741f8341a2a24b0c65c5fe678218dac94259bc09

    • C:\Users\Admin\AppData\Local\Temp\{2D8271D2-F487-4F8E-9E73-FCDBC18DE790}
      Filesize

      128KB

      MD5

      0167b50d149f03cf99ddd0318c4c118f

      SHA1

      4ccf5b52b9252ba2df7bce799515005c7d5673a4

      SHA256

      f069e0f18c58f0ce1a3f8504a36c0e4fc40c642d962e11c717697b6297079c0c

      SHA512

      f17da4f5e2deadee90b271d497621737d9d912216a4f1ca271630da820e48356ad9fe1e390b64945e0d1d6bcc6b9cb3697072de8f20cf4b1a2966bf184f6f293

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      0a0acf81534286714e5523c2255a953a

      SHA1

      a35d3f6caa79908622092bac7b428bffa9408c4d

      SHA256

      21d1835fb92674c05f30a04845ef4bb2622d31ee32c8bde363ba94ea22cc0711

      SHA512

      822d3455e9ffa0337ae2b2557cbb17588d91642c2249113b8944de9419e530715e82697dee73b2521bc5eb4d03552e9bd090d1b0597a0581be22a3d0442d1d34

    • memory/3012-0-0x000000002F171000-0x000000002F172000-memory.dmp
      Filesize

      4KB

    • memory/3012-2-0x000000007140D000-0x0000000071418000-memory.dmp
      Filesize

      44KB

    • memory/3012-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/3012-5-0x000000007140D000-0x0000000071418000-memory.dmp
      Filesize

      44KB

    • memory/3012-136-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/3012-137-0x000000007140D000-0x0000000071418000-memory.dmp
      Filesize

      44KB