Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 12:22

General

  • Target

    zoom-meeting-guidline.docx

  • Size

    101KB

  • MD5

    8f83d19c2efc062e8983bce83062c9b6

  • SHA1

    c50caa49156a1ce5cfb2df20ab3a5292e81c54bf

  • SHA256

    1a88ef58675971eb18eeb267b1be90594cd6c7ebddf1c67d66729fa3e68de323

  • SHA512

    872b35e9b3d08f705ca0ea83d5dfdcf0267b60ee0c306d62004721a1cfdddd7bbfb1cd6cc62c7e97e416ee94870e89dc6667711fbeb04d117bfe1d454228334c

  • SSDEEP

    3072:jwwaT2Qxib7LleOC8qAW4UwRiFD7M7uwszhbuKs:jaT4bNel8q5mi3q

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\zoom-meeting-guidline.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1460

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6c2ca65df96f0b7c51871363b65f7208

      SHA1

      004c832a16694604b546e9c691b92754da8da943

      SHA256

      cf64edd5d3b9b195e4af098c4dc45b7af03d9b0ce274cfb7241ac36ced786ec2

      SHA512

      dc5d71eb8f753ab164f118668a34585a8feb04d5876f194aa647515f60e766dadb9814679d5d53191e3c3cfd5bd42476a03e746d818b37954d86e6159d4534dc

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{F64BE77B-2038-4FE8-8D08-A4FD616A0CDA}.FSD

      Filesize

      128KB

      MD5

      6bf71996ccd430d98e9f48ad978ddb60

      SHA1

      39d3a464bc67ef90d0b88810b6a217a3ebc7f104

      SHA256

      a87aa1af094c2a925251a91a142db7ae7144a1ede2c4a7c6f505f6fda026abce

      SHA512

      406c18dba9b16d8f24c0cd631c50e1c82ff9d776ca6d71de420c0744aed40be9ed022856ba141d278b0a733431c412af20624bbd99b60f748250910121650ccc

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      e5531f303c9d67405efecefafcc8b2f8

      SHA1

      8371f407322ff4144f4b3cf214c31f7c745d853f

      SHA256

      ae7f4cc5e5b95b475adff27405709337c569d39dbd4cf65dcd47a5b8dcb95528

      SHA512

      17a89b84fd50cb992542de0d16bf89894e120816f0a975e946070a674a473bcbabe41140dade4cb81760d1de3fd1e77e25336b9af62d710b997539a4aca94970

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{AD739CBA-662B-45EF-B2AF-5426897EB4E4}.FSD

      Filesize

      128KB

      MD5

      9763a281b602e7d4e0cfd839d2678a77

      SHA1

      c6a5c034ad2047f364975ced0c47cb07fdee3e8d

      SHA256

      0c3e9768f5b0caad005d0596d1b684c193d31b7dd276d28aa63df974df7baee7

      SHA512

      1b251bf6a08c05e0f152924ab0cced2f313eafefc32680fb5219e9ab36b4e13541dd7758c278b28aba33db1fbc062e251f91088801f69919d41d7e3b65ba5962

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\file[1].rtf

      Filesize

      8B

      MD5

      43d35b5b20f491be219ab2eaa172ec55

      SHA1

      1327f20512762a533c22fe181be3fcdd29ab76fe

      SHA256

      1955c6914097477d5141f720c9e8fa44b4fe189e854da298d85090cbc338b35a

      SHA512

      a721f07b2aa9c5d723a4b11575a602e94a7973278e62bcb5b54d4a48b5adf1bbe3945e5250dd0ccdd8b1b683b864f8c8b98b7c160118ed84846de085eb1d3666

    • C:\Users\Admin\AppData\Local\Temp\Cab9D8A.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar9E19.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\{90E6310B-411F-45C3-893B-F8F575A7B0CB}

      Filesize

      128KB

      MD5

      9a6c3dc6f93aada0fe3159eb05826681

      SHA1

      f49bb4fb34448efe369319d288cacef7fb08290d

      SHA256

      a3e7113c490124967e9df3508afa8596672a1d9882b1f755ff079359e3887ef1

      SHA512

      a526362835c771454911f9e53feeec6788637998b093fd74910516dfefccd3620c18fbfe447f46e2d14f37828de5ad4270ce89e07c27e4d021b84aca32e4aaf7

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2300-0-0x000000002FE51000-0x000000002FE52000-memory.dmp

      Filesize

      4KB

    • memory/2300-2-0x000000007140D000-0x0000000071418000-memory.dmp

      Filesize

      44KB

    • memory/2300-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2300-198-0x000000007140D000-0x0000000071418000-memory.dmp

      Filesize

      44KB