Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2024 06:16

General

  • Target

    98b04ec2f4fe5067fdd41e4bd4cb4de7.docx

  • Size

    10KB

  • MD5

    98b04ec2f4fe5067fdd41e4bd4cb4de7

  • SHA1

    ae9251ba328b72682fc604334107a5654d45c2b8

  • SHA256

    9f56f4584e859e5e6d38a9675131cf499d735b1637156da7ad6bd1ce78d6babd

  • SHA512

    43e9af4319324e2872145c89c00748f7dd9d80ab4abfce5e3f12145ca0de6122e1cc9354d461007849af96a1a1ebf77fffed75cba717aa54012b96317e775c7d

  • SSDEEP

    192:ScIMmtPZG/bEpOVYgEamWBXpK0ydJb3FNwR:SPXEEpOVYNoEP7bo

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\98b04ec2f4fe5067fdd41e4bd4cb4de7.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1064

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{F394C44A-614D-45F8-A3AD-8684198DE637}.FSD
      Filesize

      128KB

      MD5

      70bee894e20f2ea19380fca7f5b5fa1d

      SHA1

      fa556b12decaf485f956560e8bff3ee70bf462c2

      SHA256

      85de5ba561ed5e8406fbd1bca37c4e7c74a350995a7eec43aceba00a53939ec5

      SHA512

      784b5b4e2f68f67e9b8fbc4a545bbda50772f95292e036648640c16db4bb7e26b6cc48249d7e389fbd0aebb40d7ddb561da92aace6def5ca4525e922f00dcc51

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      16a735cff9feeca032c3b912d9c352e7

      SHA1

      a6040b7c075d078f01ae54ebf2203f5b1e1432c8

      SHA256

      8c1215195d7e773bec696fa9f4fc1eeb1a258c1129589312ed00b54c0a437bba

      SHA512

      f4bea8c4d065aff7ca76d36fb4009cd6d9b57aef22450cdf9757022daab7f9fbee281e1690b3bcc7627dcc5d86674fddf023faefff0be1374c28ba84031c566b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{8A5AED13-BB8C-495D-AE2A-7C4D82FDDEC6}.FSD
      Filesize

      128KB

      MD5

      5ac7d2d686fed81b4002ebaf36bc43aa

      SHA1

      365dc2e577b58dade5567b8dadaa34626d05043f

      SHA256

      5a7f93ec69959035b52453dccc82f00593d748103d14b474451a25ef9a38093b

      SHA512

      b0ccae5018081e54131d2d30d0ce63630405fab9ba18670dbc4f3ca20bef77bd5b096526ca9e046717aafb5abe3a3524c3af206c25f8e0a9bdad6a259d650c5c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFTKP12M\2ggwo[1].htm
      Filesize

      1KB

      MD5

      d914c50ea182e1ebe73afc51ca6002a8

      SHA1

      93ef91b77f7f2fc67cfb5576e82a12dd0ae7186b

      SHA256

      55420054e14d6834da52dcdf4bae09d93985216c7600533bff648b7dc9eec052

      SHA512

      5cb1faa7b679d15d03d48861b64611a5204418bd4f43af0a9eb29a6a78381d0060e186ced5e79c73af5a9a39cbc9c950f57b0221ad783b782a6d31fe1c79dd3f

    • C:\Users\Admin\AppData\Local\Temp\{3C6759CE-E19C-4B25-933D-6950AA45C3D4}
      Filesize

      128KB

      MD5

      e95942ce361d0aa6d07e40711a9e3824

      SHA1

      27b825f972fb2643b35a2b94fa74ebbe649fd5fc

      SHA256

      b7fabab5dd92c143ef159191317419727b8d09c5279fcd2dd8dba5d7f61e596b

      SHA512

      ba48895d3a26ac98904febb2da4dfffea06bccf5a37f94e1a751491ff1ce7750763a1fa50c3159e4955afa0d9841a6e9e1789e50de0d3d77021af9ded2e4cc0c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      4de7df2f2a1f31d75ad2b9f037598eb1

      SHA1

      705e708c3ea47a6c38fb09520cef7abf03d17f6d

      SHA256

      c678e03fcfbd696f19da1e010f2f73de2618a1e7669a8b6f12a67185ffcbec6c

      SHA512

      598bcf71c32cec4e5ec85024ccd7c7093b33e19cfd42cc86ec44cb26d0bbd178f045dd07328471f5b0e5d4645de544aa7250e0300e24e91392185b30ac38d70a

    • memory/2148-0-0x000000002FAD1000-0x000000002FAD2000-memory.dmp
      Filesize

      4KB

    • memory/2148-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2148-2-0x0000000070B6D000-0x0000000070B78000-memory.dmp
      Filesize

      44KB

    • memory/2148-86-0x0000000070B6D000-0x0000000070B78000-memory.dmp
      Filesize

      44KB

    • memory/2148-136-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2148-137-0x0000000070B6D000-0x0000000070B78000-memory.dmp
      Filesize

      44KB