Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 21:33

General

  • Target

    1d2094ce85d66878ee079185e2761beb.docx

  • Size

    23KB

  • MD5

    1d2094ce85d66878ee079185e2761beb

  • SHA1

    53b31e513d8e23e30b7f133d4504ca7429f0e1fe

  • SHA256

    938545f7bbe40738908a95da8cdeabb2a11ce2ca36b0f6a74deda9378d380a52

  • SHA512

    b212a49ec0431e7f798ed917e4899050c2e3021b0606ce2188347f3d06fdad0f762417801004bfddf8067131563342b8feb7ed4142b864a955212f9cd9a9a503

  • SSDEEP

    384:Q6UDg00MWEg9fPCPyH111/elBqhveoNHfn5yAehqbhtgyhdCxi556BjsbIwRu:QcMWE04uebyvNv5yHcttg6dwc5YQb5Q

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1d2094ce85d66878ee079185e2761beb.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1956

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{E028E5E1-B35F-47FB-917E-9FF162B9AD89}.FSD

      Filesize

      128KB

      MD5

      278a639f9864b44992a2f0f930b7c932

      SHA1

      a9f42095cf3567a7f560adf2c43d11aa5a1b198f

      SHA256

      539456069e77d3e87fbbe13f07a6a8ac0c66e9fd81c32477438be4b369cba315

      SHA512

      8c609d1d34f0016d4b6d0f6d76ff44450b0cc164902a279d5277a6e4a8bbaeb6319a4ed48cb753ce1d5e3611b648d5bd56e1169656d4e71d20e760a0c595d062

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{1944D856-0B02-4183-B727-CDCE89550FF0}.FSD

      Filesize

      128KB

      MD5

      7bda74ab5b736695a01cd84f9fc9f53b

      SHA1

      db5491a31dc1335cc5b4bee353f1ad06a1665e6c

      SHA256

      9036b6bb10fa3ba04f4d94ce83f9ae076ac36f5c9701412ecb3cd3c1c830fc91

      SHA512

      42399447498497c942929af86a3754fd0ace07febab5bc9c5e3b1bb500caf0d876ed0bc9b503a31d217a775d842f630dba056ee44708376973b49cde23b0605d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C3A4830.dat

      Filesize

      52B

      MD5

      07ffeff17a8a1a1209ab3c2690d569d4

      SHA1

      37cb513fabddcdbbaa2e7296b31a4bc9832e1b01

      SHA256

      57cfa30bb860b95b7012ed62427025959b671d270aaf67fc406fbc3c4f3c48d4

      SHA512

      743591e7bfe9936eee057c9d1769595d48c90ba28057d8ebd0f7299b8fcacd7b8fa50af30bd0b8b6e09f77ade16b47d6f0abb079d60e975443a57c514099ad86

    • C:\Users\Admin\AppData\Local\Temp\{246D51BE-7974-4581-8EAA-DA4349843FE4}

      Filesize

      128KB

      MD5

      d4cf1f0df7730a88ac8c12696e029df3

      SHA1

      3c5f63e831b2531034bf823ac8d790c4574cda2e

      SHA256

      cdb775d1cf96ba78b3b70ca2e7279041b20b2f9e3a195be2381b19fcb7fa7639

      SHA512

      a475fbbf0d69511e8e71c9983c214dc9516505952dfd84921b001dd93457676ef1e30e97f334cdfd4869345ecbffc48dcac3978717b0ee0e37b54526117290ba

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      b80d693720862cdd2d5f9ece90c0272a

      SHA1

      6f8cad3d5a6c7bbf3050719581b18ec542e947d7

      SHA256

      29a7e50e7641cb4340c3863a63dc4235201c53567b732a0f77bb828cc6d97e03

      SHA512

      965abf22064921b28784762f0d0cfc61fb4845080aa80a47c479e469aff0e9000d41ad1b15de036c3ed26285d9da7ed1fac16a719bac706050bac49aad2940aa

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0809.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2204-0-0x000000002FFF1000-0x000000002FFF2000-memory.dmp

      Filesize

      4KB

    • memory/2204-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2204-2-0x000000007104D000-0x0000000071058000-memory.dmp

      Filesize

      44KB

    • memory/2204-84-0x000000007104D000-0x0000000071058000-memory.dmp

      Filesize

      44KB

    • memory/2204-108-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2204-111-0x000000007104D000-0x0000000071058000-memory.dmp

      Filesize

      44KB