Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2024 10:12

General

  • Target

    TT082112.docx

  • Size

    10KB

  • MD5

    86255e186d21c74c14693a644dce28a6

  • SHA1

    d4177a60f4884035258c7de621d3c3ec9421e282

  • SHA256

    f2d27ce8d345c73931ceae72ca3100eda4481545a6e7d584bc20d19193dca2c0

  • SHA512

    a87be6b4233040aef5790a0e68e05459dc3d07a295b7eed8f4b88ba00a6d3429769fe54778779dca8599bd5ba6f8ad64110c0fbecbed09782ee3655c9d6bfdc1

  • SSDEEP

    192:ScIMmtP12G/bWvsq2VwO1KrdlJFOyX3OR:SPXjmx2KO8jJFlnK

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\TT082112.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3060

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4b97855e179e4bef0ff7356b7cc526dd

      SHA1

      b8fab8440c1b662567f508cfb0a5438dd00bade2

      SHA256

      aaf10842be07c1c046f3efbcd9d812081d402f87e3ecde313a4d657c28a70b0a

      SHA512

      7e26c8d34ae9e40728a562f163c8519bf1b4701a5ce1b072c2f30a1106f5855b446c34554c8581e319889f2f5baee0d1d10bf82453aaec7f8bff79112b2c263c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      0511d31336465a24ef1d3745db33b1c7

      SHA1

      d2f2561d0512fcb46b084a5ddc13f7b3bed52bfe

      SHA256

      0e5108b4306e4d95b87ac76bca36a082211fee8b5e0920e80a12bac68edf6682

      SHA512

      0d97919104ac3f0d2059bfaf20ccdd88b933fbe26ddf360e6c23a7254bc87a048c7f9253130573f570a2c66254144e612f4590026d1ad8c837e02699fb28167c

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{E34567FD-B4E5-47F3-A780-9873BF7B0D7A}.FSD
      Filesize

      128KB

      MD5

      49c626215bc40b956c9a65661834c08b

      SHA1

      cae163d8cb44bd03d4993bb29eab8388e7382887

      SHA256

      0124e97cccfe29e9808d2bf82eae6c80a52e8157e36f2c67777f9cf14a9851f1

      SHA512

      0176d381027e6122e7d830dc04b1e65a3f227799d7b50fa55d06a7c3f8513634702e493193740749c6c80233730c62f26c019f08a8be430d41df388b6cd9ae26

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      43e04ede6e7547f659a346251eaf6e18

      SHA1

      2b7dbedb85f37ab4072341faf0f75389ab548d45

      SHA256

      14b0758e9f0614cd77546e96e1954ecf9c79851d1eb6ea3522c7760720f4c039

      SHA512

      74d14e40e2007b89cfcd6565daae3e1eeea69594f5b5c566703a1713d7230fca2c00932dcc8c7ea98dda2472c5df3983b0f55c4edb3d2b802f3eaa4304ddd0cc

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      623cfea9ef527073e3e8acbbc277c1b8

      SHA1

      542dd7996d996b84df8e6e5e0b33aee1a4ce552a

      SHA256

      c5b790afbebe4eadbf90da1d2fa3209e718ee390b773b7e3f658a036da108ace

      SHA512

      f26c22c19b209e7241dcdb52f88c73f96e8ae3465faec88fce00dcaed1cf5ef0ed8ea7365c56bfcd28089c22ea799aa6971c77e11f8b9b2ec68d23a07005ef07

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{9B487FC3-8EC4-479A-9D91-A8E2A0D48A58}.FSD
      Filesize

      128KB

      MD5

      5f3713d117d4e7689de4072ada9c2519

      SHA1

      53bf7583f3196cd400f4b65ed8da7c71d290ae7c

      SHA256

      079e2b259f8e80bd12fecc8ffc7ce27aa23dca27c64d0f1313aa763ed408c221

      SHA512

      853f286632e2628da3b238dfb71ea4386131347f51c17f3f0ec8d463989970b4a33b6cf5e82b38b440e959ad36008fc2d5ecc6da2e907256befe369cdc5fcefa

    • C:\Users\Admin\AppData\Local\Temp\TarE1A.tmp
      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\{A6AC803C-0AA5-481E-A30A-B653026C5D12}
      Filesize

      128KB

      MD5

      9fe298f7e550e9b64e881a688b1f6f8f

      SHA1

      b5f485aefde8a46e45ba62d3fbe4e9f754f0aace

      SHA256

      fd5434af0a174282295a918504de1b7c851601a937fe4f475b80b870ba8ab311

      SHA512

      80f2a4ed79c4641a84349ec9800170f4f87bba9ff35fdbcf0dfd897c5d050a92dc64a8838b024c88c27b8d6409ae57db429a169be07c07816707b90becb928da

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      b4f0b99691bfd08051851c90e9fbf03c

      SHA1

      9676eaeddc21fd7ca39fc1d4c2e0310a5ce5797d

      SHA256

      5ba5fa8cc4f0a1d9c92da6b3adc2c17dfcd4423f234ea54b9b16a7339bf80f6e

      SHA512

      33b031b91868ea60ed3f8e106d7332454bdd783b313b9dbf716785d0f343d5017a211f56adc6974cd8e20ac77130474fe11d952df2d425b4256d1ecb04dcad91

    • memory/2860-0-0x000000002F171000-0x000000002F172000-memory.dmp
      Filesize

      4KB

    • memory/2860-2-0x0000000070BCD000-0x0000000070BD8000-memory.dmp
      Filesize

      44KB

    • memory/2860-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2860-167-0x0000000070BCD000-0x0000000070BD8000-memory.dmp
      Filesize

      44KB

    • memory/2860-193-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2860-194-0x0000000070BCD000-0x0000000070BD8000-memory.dmp
      Filesize

      44KB