Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2024 06:13

General

  • Target

    86255e186d21c74c14693a644dce28a6.docx

  • Size

    10KB

  • MD5

    86255e186d21c74c14693a644dce28a6

  • SHA1

    d4177a60f4884035258c7de621d3c3ec9421e282

  • SHA256

    f2d27ce8d345c73931ceae72ca3100eda4481545a6e7d584bc20d19193dca2c0

  • SHA512

    a87be6b4233040aef5790a0e68e05459dc3d07a295b7eed8f4b88ba00a6d3429769fe54778779dca8599bd5ba6f8ad64110c0fbecbed09782ee3655c9d6bfdc1

  • SSDEEP

    192:ScIMmtP12G/bWvsq2VwO1KrdlJFOyX3OR:SPXjmx2KO8jJFlnK

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\86255e186d21c74c14693a644dce28a6.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1552

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b2adc0a3a3907136e85ac5cf73717c21

      SHA1

      a196ad08b9ee93a3ca3b01cb6fd494607f86d479

      SHA256

      c6944989833a6d7d36ee716f57fe48503d5365320ca80e3f9e813e45b95ffbd5

      SHA512

      b7ce4e78316dc36c93bc64548c96b20f0b6b887f6105addd10ca8d1d40f8a470d82274c664aefc4c22bf506cf65857abb76052a869584607f74f6284d0c45808

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      665f874c246b41835ef94fb5a8569999

      SHA1

      9b77371dc4fdcf2fb24d862ae78df362b0b069e6

      SHA256

      a6e7b52c47789c5f4abca070ff42c3a969d1346d8e4c7067977384b411c6773a

      SHA512

      e665af689d477fdf1b55279fc1f238d18e4ef6e5e9a5c904d561d9b9a801cb62209574ca34e74f7e768192a2f1c3bb51bd64b5b386a3d684081951c911c36286

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{8B029B2C-AC44-4537-8FA3-86F2915412A3}.FSD
      Filesize

      128KB

      MD5

      780039c2371a0f3a38169407fb853bcf

      SHA1

      10e3e39e255fc8b076ea0cce9b192ace11f83f71

      SHA256

      a176cc0d9e5684375baddc0a949aca4f893d5896828f4a858620e39082428d69

      SHA512

      fb8667d9c9e3be058ae9fae4c3520188701c185910621d053084f39c6123556efb7314641ff79d9615bf891df30afc94b36095ccb3871e1f6e18d81a50f63877

    • C:\Users\Admin\AppData\Local\Temp\CabFDC.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar106B.tmp
      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\{4ABBF5BC-C6D2-4390-9442-239A66E831A6}
      Filesize

      128KB

      MD5

      427a985f4152b852f1cc928de7f28709

      SHA1

      02b56a1c733bcb37547dcda4c80ef17b6dc68295

      SHA256

      3262569008dfe13a3b29e9fecbdcef24da78d1a11866bf40bb8fad5a331220cd

      SHA512

      60078db9e369a125868e3f1e8470f98b8f0aefac48c385743cb6089b89a1000703b53803e365e98c5b968f127cf2b8c9a42dac8be2547b3728a339bdd388fe71

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      1051c6ca5eb015dc2ccdc2c1ddcd7ba3

      SHA1

      ca3a7e3fb2c015a609719da796c830cd4dffd12b

      SHA256

      4ced186dded67fb897f8d58184f30dbc074ad895231e81aeab668222df6a478e

      SHA512

      6781a39d59e4377ca95349924ffa4e4e37b67a27af6177a4ec2919a11eca14279c4e22188af4d6edaad709878a2ff85de9b8628c0153e477117b3fdfc3886cb9

    • memory/2552-0-0x000000002F1E1000-0x000000002F1E2000-memory.dmp
      Filesize

      4KB

    • memory/2552-2-0x0000000071A3D000-0x0000000071A48000-memory.dmp
      Filesize

      44KB

    • memory/2552-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2552-139-0x0000000071A3D000-0x0000000071A48000-memory.dmp
      Filesize

      44KB

    • memory/2552-165-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2552-166-0x0000000071A3D000-0x0000000071A48000-memory.dmp
      Filesize

      44KB