Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 11:58

General

  • Target

    17c5cdb8126b9a2b3251da51c338ccd0.docx

  • Size

    10KB

  • MD5

    17c5cdb8126b9a2b3251da51c338ccd0

  • SHA1

    2d2769e5c138441d77682eb98ca95084d33b6588

  • SHA256

    d8567051c5186647aa813d624b1b74be5f45d1047babfb99f3986233d9f6018b

  • SHA512

    728c19cd6e8b7f752ccb173f39e009bdb48138557e28a3242b116acdbed1c5615f6bfb153a4e2dfdf599c1ce1bb93218c6708939266b7221e12411124553020a

  • SSDEEP

    192:ScIMmtP12G/bWvsq2VwOeMrdlJFOyX3O+x:SPXjmx2KOBjJFlnB

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\17c5cdb8126b9a2b3251da51c338ccd0.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:356
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1412

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{B233D7FB-62BD-4992-8EF5-08C13B978C42}.FSD
      Filesize

      128KB

      MD5

      23f755a5bae18c3077f386cee7f16586

      SHA1

      f1881d85c44f056dbb6abcef0978be5246aeae76

      SHA256

      ae8b2cf54ef55d0e43e2f7189ef6a3c61227af0261039b9463e23b96f5fdfa0b

      SHA512

      1af2706df977b3a3577946e938a7a32764c8511ac67c6f2bf97b997386107ca2054f8ff18249cc8ad0e97bba94b2bace40382d5abe4d72a07a0b7c57be11f538

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      8227dc5e2229aa19f8f91bfd0ffc0460

      SHA1

      4621b01d626fd579e03086624678462df5d11249

      SHA256

      e549bf8f685df318ff084909e9b042df87ce3249d063ef71de43085328f1112d

      SHA512

      40d3d90c86719f4d152a504391ae45d8c5c261cf2694acbe858a26184285419c521d52f5e3cea966b2c17bfa6df01bc17698054e7d8a318175fea611f5019344

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{FB624FE7-FD2D-4CD4-A985-C843AA79184D}.FSD
      Filesize

      128KB

      MD5

      87460a60e94a80d0218ddba1e15ca6f7

      SHA1

      88349c617e743686b7286863fcf71215e02f9251

      SHA256

      a43467a3d947223c33575b5ea587b61094e0808582a99f2d415a47cbf054c656

      SHA512

      e85b3c57c0a623ef9eb3cac20e19f284e57bb51935f6a0d1af727e61dafc6b98c2aa4d8d1c50dd0c1cf8598514e13133187b51be885269fe27dae13f683634c1

    • C:\Users\Admin\AppData\Local\Temp\{A7143E74-8A12-45CA-93FA-BE38EA22EC02}
      Filesize

      128KB

      MD5

      5a6bcf1f7167f802628593e2f61ebbc5

      SHA1

      6a6b431c577d4043c7eec42f770e3cd1daf94edc

      SHA256

      fbaeafa9b6c3e530feacaab3f00ab84a2b4752a96f7f3d352452ad733ca7de0f

      SHA512

      239257d05723b80cb0291f7799d23a6095283abb5c1009ef151d2a39e1436405671d0956f11ad2f3704838a219074db8bb70b0ec56622b81e322bd682c636e3f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      f022e5700b4eff6afc26336f9e0c0142

      SHA1

      77161a4368fa93a463a1ebd1ad2ddcd3e1e20af5

      SHA256

      7a852db1c5a38635ba2eb1bcf28721bc6440c56283c94a79533e4845cb6162f3

      SHA512

      022580f5eee940d402f93ac75a1cb728d663e9468bd57c456f32f3fc97d24aa3afd074b38812f5bc5f5cb9ef5eb9b7c984c4b602edcb9c3375a79ad9a71662d0

    • memory/356-0-0x000000002FF61000-0x000000002FF62000-memory.dmp
      Filesize

      4KB

    • memory/356-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/356-2-0x000000007152D000-0x0000000071538000-memory.dmp
      Filesize

      44KB

    • memory/356-77-0x000000007152D000-0x0000000071538000-memory.dmp
      Filesize

      44KB

    • memory/356-103-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/356-104-0x000000007152D000-0x0000000071538000-memory.dmp
      Filesize

      44KB