Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2024 00:57

General

  • Target

    667b669aa8550120f1e4281ec1d94b50.docx

  • Size

    10KB

  • MD5

    667b669aa8550120f1e4281ec1d94b50

  • SHA1

    4973d9e75316e3873d3b8203daf59e84e21cb4e0

  • SHA256

    7402820a9e624e3c35ce2275dd9e6d73e906d976c8e4da6a140ca7cb7daab2cc

  • SHA512

    d0c4b1846501b2f55a692a1865e8c9afee3607ec9b29173132b050953c4e406c0476a08177cda61712fa713490afb11f8f13b38a794724fea1dcaaa3d86cc782

  • SSDEEP

    192:ScIMmtPZG/bEpOcOsWgEamWBXpK0ydJb3F0tx:SPXEEpOtNoEP7by

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\667b669aa8550120f1e4281ec1d94b50.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:848

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{73BFB082-FDEF-463F-ACE8-EAE8464A9B0C}.FSD
      Filesize

      128KB

      MD5

      67b5d0dff2d356007b8f1cb1fed328f3

      SHA1

      dcbe36c112f9fd78272b51992f7e7c6192dd1a92

      SHA256

      40bd27b3724429bcf870278a53f8f04be1373030cf91f0facf56ad8fa5dab8bd

      SHA512

      b97671a2d0f13dea6915b22a4a2987e2608e13e0cee306ccd103a69093e387e4960b78b6f130fd71e682ee6b7652cab223fbc395ad8513d8d1d8f6119109c85e

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      1aa622c489f99cd3f1533d5283b466b4

      SHA1

      4d914dd5fa17612a5259e0f2b755381e19ae9600

      SHA256

      db1bcbe199e19f907716ba6f900e77abe37b2f6f2196251f2d6eb0ca8abb202c

      SHA512

      961559e084aed2bab01606c52195c693e03477c294035c1188ee8b8a30646bae9f494d468d63b244b76cce5e9d3c39dc5739bb60b48a7ac7282177b267689075

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      75c6cf725f14d863c412e757ea4d5190

      SHA1

      d8f34884edbd533b57242a299d797a592f2cf09b

      SHA256

      963266ca7782da3d07e79c61e32a9e14e5f0e6e18f8ca429732b2797f4c296db

      SHA512

      063e914410ab9db635875cf339e42e842cc7a1b421a5a98132ca5d69e014235703ba57bf7e18346e0e912a0d5c80832531c6b2c403137713f6484502072ea134

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{F70D00BC-89EB-48AD-A563-E8A177687D82}.FSD
      Filesize

      128KB

      MD5

      2b5e8e24156b024a446804b95d0e9c66

      SHA1

      cae965c7242038e337e13dae7208bd8ef540f035

      SHA256

      3fb78c9d2af8ff3fab8d653b780a7878436b885032fe467eef4f06b0363fc2aa

      SHA512

      cef1dac8348ea0a5e81f733c8340bfaaff73ca7374688d5a8c7837b9c09691c514ad87008fa37565efafa90be4447538e1e60c02832a4027f83e6c48857db853

    • C:\Users\Admin\AppData\Local\Temp\{8B7C0AA5-0B91-46CA-9D10-D7E00F3E0EE9}
      Filesize

      128KB

      MD5

      d3e855b9914bab4b19362b1e85d19e74

      SHA1

      c6de68e7db6a331175b4704acbcf82550bf0a78f

      SHA256

      d4c843f7f537f05e091479c35605fa7378656eee364404daa9360308b3b7c8fb

      SHA512

      ad18f2e7e2f157547a6f0f116a9a326668332dbce5dbdc31d90aefec0846fd42998f5ac0bacb5d04b1e96b72b33c640a6d92d31507be545cf23f905fb19d2857

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      08752771a69021538b9bc181b31785d1

      SHA1

      0f223ab55d8413b32326f9eef8ff11f925d342ab

      SHA256

      9a34b1844b1e2439984cebde8457780a7c79ef31e449950228e7334980614693

      SHA512

      f12755d1125c203eda1c010cf7f3cbf95a54523e441df15c830278ee3f514709f2655ceb81aae4770de6c13108bdc334666eb852625ab068451f30eb42f5390c

    • memory/1684-0-0x000000002F7A1000-0x000000002F7A2000-memory.dmp
      Filesize

      4KB

    • memory/1684-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1684-2-0x00000000715CD000-0x00000000715D8000-memory.dmp
      Filesize

      44KB

    • memory/1684-5-0x00000000715CD000-0x00000000715D8000-memory.dmp
      Filesize

      44KB

    • memory/1684-88-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1684-89-0x00000000715CD000-0x00000000715D8000-memory.dmp
      Filesize

      44KB