Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:11

General

  • Target

    DHL-LHER0006981753.docx

  • Size

    30KB

  • MD5

    03cbc5e4108df2ef09177dcd3821f1f0

  • SHA1

    ab408a500d69b96f934325da1b903c0c6d171a37

  • SHA256

    bf5f7e0398d78184a6efa2368b9faad3a45b5fa69767d36f02dd9ab7d5c419ce

  • SHA512

    1950c7903e8a83408fdfefdac353dc193f7903f0a66b49bb30bfa2f3d08761a6508c833d4e820a5d7b8d260944ebac702c0567e8fc45473ae08c0cc0b16d66da

  • SSDEEP

    768:GhnTgmuFze6jgomfsRYKiAMx9Xg0mpOSqwCot:wV+66rCYYek9XmZ/

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\DHL-LHER0006981753.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{1C5E67DD-A458-492A-82A8-856C10A3B71D}.FSD
      Filesize

      128KB

      MD5

      396ae094b28f757f9b8e7cd6bfbb1cb0

      SHA1

      ea39d717ee3933f0c379cfccaa967d726cceca80

      SHA256

      6de4a868d4157e4e6125ab74ccfdadda475eaf758ecff21f13193c690d13e2b0

      SHA512

      e30e1a1179bfc64835d3053fbdd6706186d141761e131be645643fd2f6d46d5afa2e92d1025bbbf47836df179f326c432307ba8f5233640e971e07d7550300e0

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      bebcfeb85d5b5bdb6320b103b21dc600

      SHA1

      6977a7f165517bffcc8a330ba2867ca644ba5a7f

      SHA256

      bcc48b7758416c3dbaf8dd926fc472cd61a32f4d6b94be76d5c44707b264e73c

      SHA512

      2b38b03b384a8de0419719b97bdf18422afac560b3ec15a56c370393d3b247bce95deb6bab920ca256ca5dcbd2ec616c6e18282efd69b7da5915ef346adf2f7c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\dyown[1].htm
      Filesize

      1KB

      MD5

      9786771257d7dc217d5c18dd9c43e1a6

      SHA1

      4ea976e72f81f54ff4f84e50048c1c0c29d3f559

      SHA256

      db97787d2ec05c8175539e529bb212ec055e3bcf71b79d65d86b9d0a5da35b2d

      SHA512

      a9b5a8d92ef626114c00f3a6b7bb211667ade5f56328d085db54dc2b15c3319b14747405a41eb9c5a6b8ab49673851ab038c41521dab425080fd5b813b425cd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BF30FBE4.wmf
      Filesize

      642B

      MD5

      4f03b86e4d6631c26ff5fffc7332be1d

      SHA1

      14952a78ea51df67d5b5b6c6b4de3d96ba7935bd

      SHA256

      83f4ea26254d69825486bffd1d400217aac7245c5c48fe5acc3ccdea173c4851

      SHA512

      4bed29b66444d826e89589b55dd786758ff68fcd2daf8296703d4443edb991fffce563e20db22bfb34fdb488638bbb43252392b6c105d12e721329adc2774632

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F8AF466B.wmf
      Filesize

      370B

      MD5

      271d85431b6b680813e35000305ddd89

      SHA1

      b943a11edf9612f9feca7d91985afb473191ebc5

      SHA256

      041186bc3112af22e8608a6db5ffbc11ea061eb66aa095d902bf2e30d482c032

      SHA512

      700308335934104e86fe47c8dbcb0b7d9e1864b1c8acd524505258440bb2d2734696a03447d8f0822e042c3156b6e0b580dfc2f36342f2e5d946a32773268b19

    • C:\Users\Admin\AppData\Local\Temp\{9D98286C-5E9C-4011-AA4E-7C7C6EE9C3E2}
      Filesize

      128KB

      MD5

      cec30b6162059eee804a10c60a707e28

      SHA1

      4c183c3f0f463371e58d8addb672b6ec3aa33250

      SHA256

      c07b65e0468dc24eb26ff97b2a3e6252c4704457e85bdd09e5f56b0a585ab87d

      SHA512

      d66a70c666b85794d193f35f82dea4cb61b3fa21c20f24e262d034e52c0b642b60543dff9cf3e774e9de9caf746311fe836fa0227f85f6525b581b1e1803721d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      40ebc109908fc12fdead38092350bbcb

      SHA1

      8b600ac34f2cb3847bd0206a552d5bf17690e0d3

      SHA256

      6b9e822e00238a20a74983d6f5e52780d2b470da5728475ce0e97b0f5fcccbc7

      SHA512

      d025d3e00720ad061f38072b24ab0fe3444073d0ae22dbfb176d4be021a764fb111ff69eaa7eb1fb2716095406214b295610a45be48c2c62787caca1b7b9004b

    • memory/2000-2-0x000000007192D000-0x0000000071938000-memory.dmp
      Filesize

      44KB

    • memory/2000-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2000-113-0x00000000070E0000-0x00000000071E0000-memory.dmp
      Filesize

      1024KB

    • memory/2000-0-0x000000002F941000-0x000000002F942000-memory.dmp
      Filesize

      4KB

    • memory/2000-137-0x000000007192D000-0x0000000071938000-memory.dmp
      Filesize

      44KB

    • memory/2000-138-0x00000000070E0000-0x00000000071E0000-memory.dmp
      Filesize

      1024KB

    • memory/2000-161-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2000-168-0x000000007192D000-0x0000000071938000-memory.dmp
      Filesize

      44KB