Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2024 03:38

General

  • Target

    acbfbf6fd00fa347a52657e5ca0f5cc6cbcf197a04e2d3fd5dc9235926b319d7.docx

  • Size

    1.3MB

  • MD5

    d8df558c411548de703b56eac8e05143

  • SHA1

    b0c489a139435bbdf7b565fa70733b7fda1c660e

  • SHA256

    acbfbf6fd00fa347a52657e5ca0f5cc6cbcf197a04e2d3fd5dc9235926b319d7

  • SHA512

    caff566ce0a18567b6a39a84d98dc54ec67fe7c1122c245b454ac54667a0144615de9b29370c5e68b2f89dcb2f8b0fa1cae960d14813a88d78e7e4524f8e6faa

  • SSDEEP

    24576:0EkS4d0mA42vni/50WwiA6lMxjcs2IqRI+pFtZUFPFSvPX+:XhI0A+ih+H6lcj/27I+jtGjwO

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\acbfbf6fd00fa347a52657e5ca0f5cc6cbcf197a04e2d3fd5dc9235926b319d7.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1216

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{5C4D891D-6297-4EB9-9F46-5F3A4066194E}.FSD

      Filesize

      128KB

      MD5

      8f3de569fd34d96b2c7550e82c25982c

      SHA1

      3eb454abc667e5f0b08292c9eaff1bd3ee65f8c8

      SHA256

      2dda85e7c04ba61b66812c7084eff2c85f4b21af0ff7a00600b9c156a48b8162

      SHA512

      2b5ede050709d122af2a4a6e9c8cfba2f95f374e3869ec211504bc03ce7e5ae69dff4bd60bb440aa012f7a2b621907c315cf306ca4e0940c451b25e99466acca

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      68001d15abdb3d86dfdf416b90872e70

      SHA1

      306454e6366e0e01a27ef77e3109294bc5feb172

      SHA256

      3b314fdcdade14acfe88ae6a8ec96c2d132bdb4d8c51af7b629093faacd3bf06

      SHA512

      3083d35d9dc48ac7ea1aabe28ee321ec380d8d89066480f4d32b38cd3b5544dbf7f970a3ffc706e85a1e345d3447f4a08e1c7351f6a665c7f4c6a3d6c93d004e

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{5211634F-9836-475D-9F16-C8A01975BB83}.FSD

      Filesize

      128KB

      MD5

      1964e1af22b3d7188553fc1c4877059c

      SHA1

      371b69f764d523714e45f23d381f981fb54ac6c3

      SHA256

      0c053a5990f1c5c27aac85fa729369f10b42dda315941e299c89a8f720fbc6b2

      SHA512

      255a1452a4a9241873f2965a8a630ba1971ad216181cb0615e42f4a6d934cf5f23100b02cd2fe80de8aa4d2f24ebdc35264360bf023b1841a6504bdeea753c39

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\file[1].rtf

      Filesize

      8B

      MD5

      43d35b5b20f491be219ab2eaa172ec55

      SHA1

      1327f20512762a533c22fe181be3fcdd29ab76fe

      SHA256

      1955c6914097477d5141f720c9e8fa44b4fe189e854da298d85090cbc338b35a

      SHA512

      a721f07b2aa9c5d723a4b11575a602e94a7973278e62bcb5b54d4a48b5adf1bbe3945e5250dd0ccdd8b1b683b864f8c8b98b7c160118ed84846de085eb1d3666

    • C:\Users\Admin\AppData\Local\Temp\{88FEFE15-FB1C-48D3-A307-4558016F97D8}

      Filesize

      128KB

      MD5

      efc4a5c320c9920d591f2422fa663eb5

      SHA1

      bb422fb8c578a3801d845d14fc2c9eaa6ef0369a

      SHA256

      96f51a214bbe34f26de9835eff39d672fb7a6de40e6f7c96178b7de118d506cc

      SHA512

      a4fb44b83e8cd4dbb31c3f75a1b665c87971091891a7535893492c4c2c87c157b468a393ee178053859472afb6c07daa6baf96402ebbd6a47c0091a4ee602595

    • memory/2512-0-0x000000002F8D1000-0x000000002F8D2000-memory.dmp

      Filesize

      4KB

    • memory/2512-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2512-2-0x000000007119D000-0x00000000711A8000-memory.dmp

      Filesize

      44KB

    • memory/2512-124-0x000000007119D000-0x00000000711A8000-memory.dmp

      Filesize

      44KB