Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-03-2024 14:17

General

  • Target

    Payment Advice.docx

  • Size

    10KB

  • MD5

    cf876d4261e9141b8ca7e4b4afddc4b3

  • SHA1

    994f15df29b8a85207a8db033690225c3b1784c4

  • SHA256

    78ace6504e5788bf90b2b06106a519f8096c8b6e0200667c6fb60f6bebe09ef2

  • SHA512

    1238a270ebb9b782dbf9f9f6464422f526c6649ffa84391b7d45430a63f6cd170371eff622f94fc3c6d51e09e91c0929d57a927c40de58331b4df636cdc6850d

  • SSDEEP

    192:ScIMmtPi95kG/bGv7m7sOSxLRmf0krFnuTE3ZZN:SPXIBGv7jOSxLelrFnuIp

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Payment Advice.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2164

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      e6dd47d02c65bcb8105af09494e51427

      SHA1

      69df5e6426444b50a90b5af793d513ed02e741da

      SHA256

      2a76e86c5ce3135cc4958deea5476ecafaf754a62d7f5e9388dda01eb1c5cdab

      SHA512

      abef11eca50b08b985b7f85fdb498c0be245ea8fec59eb92a68bb4af4330b2cba89f72663a0bc80f6000d4d078725fd040ddc53c8f19c858fc5f16c03269024b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{FF784FF2-4E4D-46A9-B43C-1CB4C37A2185}.FSD

      Filesize

      128KB

      MD5

      1d6596989651c8bceb8ff17c95903387

      SHA1

      6e098fd2c59de7ddf1b36487e8db505c76b5f7db

      SHA256

      d027f2fee77f8790df6a4c31a5e96649dc25f0c7e7ef9b24f0f19f81ebac5461

      SHA512

      32cde5a434efafa89e3ea7f167fd31b5daa0f1ac5d585a7e8a0782125c329b58567b3c2912ef694a463b85273e3e63da724772df4816a3b9662a0f2072a1d52c

    • C:\Users\Admin\AppData\Local\Temp\{A71116FD-0C2D-4295-9370-F11957EEFED9}

      Filesize

      128KB

      MD5

      bc858523d0d00c1478bbdb22c4e0adbd

      SHA1

      7e477904ecb48ecf7d3f76013e56589ca019c694

      SHA256

      faf528671d4ee065f96fd433505a6e34b3581b4e3f3bb18edfd1f88e7bb62b10

      SHA512

      c06cd532cb9b9d79dab8c4bd66ac1bba09046bfb26119f1d0ebd33acb56e4c312fe0007d76e35bb7b9b9d3c83e24577ac68bd1ea636908dd28baf949920a6cf4

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      189b894ec9e8f66cb305ad9259cbd721

      SHA1

      6cfd5c341d13365329f52339102243fa34f2e107

      SHA256

      cba6dfab08262f38ad5f0eaf228c55a97f100f8f9e7c07f556fa0fc199204e58

      SHA512

      116c4eab662cdb48ef3732c75fdaa2fed6c29aa0556ad81f29b31fb67a63500898dbd38bb24f3f97af5d142fc0ae07c2e4a5f4af6ff4f04b2e82462e6b23d071

    • memory/1760-0-0x000000002F161000-0x000000002F162000-memory.dmp

      Filesize

      4KB

    • memory/1760-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1760-2-0x0000000070BCD000-0x0000000070BD8000-memory.dmp

      Filesize

      44KB

    • memory/1760-77-0x0000000070BCD000-0x0000000070BD8000-memory.dmp

      Filesize

      44KB

    • memory/1760-103-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1760-104-0x0000000070BCD000-0x0000000070BD8000-memory.dmp

      Filesize

      44KB