Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2024 09:35

General

  • Target

    =?UTF-8?B?0JrQvtC90YLRgNCw0LrRgiAwMy0yNC5kb2N4?=.docx

  • Size

    878KB

  • MD5

    fed1fa8f551b1e83323a88b45744daee

  • SHA1

    25ed236aa2a2e14d3c9a27048a1fea9e97278a7e

  • SHA256

    4096b15a90887040f4f09631e9a2949d28f78ddcd8698493e74d41d9b5933955

  • SHA512

    944a2e48981213529e12c5f3cad2a21d9d838007fb43ecb4c04719c4f990595f91610e8c2ca8face6f46458114f5b914f0fa48b1bd67195bf8908fa7ea3ab977

  • SSDEEP

    24576:JoNRmQBSeFKoNRmQBSeF1lBLNt2a3Z/faZ6RmnhJ9qO6zuU3x79y:JoNR/BEoNR/BLv39asRmnT9qXxNI

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\=_UTF-8_B_0JrQvtC90YLRgNCw0LrRgiAwMy0yNC5kb2N4_=.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1256

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{AB70CCD2-B914-4BA8-9AB9-48AA75117896}.FSD

      Filesize

      128KB

      MD5

      0f5e2957e982a180455295d502163c1b

      SHA1

      e28c240474980232a0d8118dd4387f58a8292a04

      SHA256

      2a73ea48b826dfe7d0d55b66d6ce0835746eebb542f497d0519b2d9964b67add

      SHA512

      5fc75f50335599c8249e68a1bc6a508a3b3989f9f74556eac02c1d283c81d0ef66620e7a27c27ea31965a62c26ad5cf25bcdad26ba4ec13b3ee008685c3e063c

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      775a581a7f9813a2e71dca285b5fe56a

      SHA1

      e4298cac069f16f682d6820d7945c481a979873b

      SHA256

      daad1ce7dac12fef28e44a0caf3451c2f1fd8b320bcb8998944fba098d88c14b

      SHA512

      17ef7e8a5e9ba50796842aa28664ba066e19d20b7c64c45bf990b7416034130e1b0766d19656da3b30b4e60dc721af3dbeb94220ac20dabf4c6e0c7d4e9ee890

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3E8D5EC8.emf

      Filesize

      582KB

      MD5

      a1652e21764136dd1f87836dfcafbe6f

      SHA1

      aab9f0ea68dd5af5e7552c007b749da1c598bebf

      SHA256

      517eeb5faca7827ae35e12eb494d8ee3d2adcd3f14d91f7bb84c515bc133d1f4

      SHA512

      0e01a8a76f9b0af5227be553865573b31eaeafa62b6f6f532613dc286905be73bbc46ac98b86fbed2276d219d4a1bba99c42b8ec290636bd185028c9494ad07d

    • C:\Users\Admin\AppData\Local\Temp\{BAC7F0C0-F95F-4A76-ACA1-77684E5678EE}

      Filesize

      128KB

      MD5

      1a9fb9a5fd8d1f24a06b5de6e547fd0d

      SHA1

      fdaaa650bbdd573f34317f326f27ed92057748a8

      SHA256

      5cc089bbef95745a70c7f38a1a9ff172f90918b1829b6cf60f25457c70ff77e8

      SHA512

      6ad2f790ee5c6e3b2474fc04434d575492478b0b577ae7678809d328584b00beff4231b92805dc884d1ab2c1a9882c5fc4f3d26fc9d31a73f56b9e3436c05e9f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      7da16e55d3430fd43831979a666b621d

      SHA1

      c1a15f1f40e4758a169b4fbcfc3a44ed85c23260

      SHA256

      80b067a5e8abbd5433aac5eab6704d429eef3586886981a8a2ef9ea6cbf3c6e4

      SHA512

      3a4d0655e5f061f27ce768ce2a25e50d16ea5e0041eda4ab9e08fdd955133ae918500b66319870b6ffcc4c568089e6d1c7b906aeb6fc8d8888b73b0d6e003a81

    • memory/1664-0-0x000000002F771000-0x000000002F772000-memory.dmp

      Filesize

      4KB

    • memory/1664-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1664-2-0x000000007173D000-0x0000000071748000-memory.dmp

      Filesize

      44KB

    • memory/1664-62-0x000000007173D000-0x0000000071748000-memory.dmp

      Filesize

      44KB

    • memory/1664-100-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1664-103-0x000000007173D000-0x0000000071748000-memory.dmp

      Filesize

      44KB