Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-03-2024 02:19

General

  • Target

    acbfbf6fd00fa347a52657e5ca0f5cc6cbcf197a04e2d3fd5dc9235926b319d7.docx

  • Size

    1.3MB

  • MD5

    d8df558c411548de703b56eac8e05143

  • SHA1

    b0c489a139435bbdf7b565fa70733b7fda1c660e

  • SHA256

    acbfbf6fd00fa347a52657e5ca0f5cc6cbcf197a04e2d3fd5dc9235926b319d7

  • SHA512

    caff566ce0a18567b6a39a84d98dc54ec67fe7c1122c245b454ac54667a0144615de9b29370c5e68b2f89dcb2f8b0fa1cae960d14813a88d78e7e4524f8e6faa

  • SSDEEP

    24576:0EkS4d0mA42vni/50WwiA6lMxjcs2IqRI+pFtZUFPFSvPX+:XhI0A+ih+H6lcj/27I+jtGjwO

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\acbfbf6fd00fa347a52657e5ca0f5cc6cbcf197a04e2d3fd5dc9235926b319d7.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2116

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      b7647eadf814e5de69cdd8d6cc0d26f9

      SHA1

      2058a487e7b0b51cb43816ade9b5df1970c16252

      SHA256

      5b1fa053d1e4a851eabb38b48aa6218d8af1d7b04aa1212c935fd62103d71c0b

      SHA512

      639c03156074ecb9e77ccfb783b47c772118cc77555c8ca6925a843ee56dc77267754016af6deb55059b0afafb3cbba8c07aa311b855172dd07ca3b2e7985f3b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{763194C4-1EF2-4765-BCE0-A3BDAB264B7F}.FSD

      Filesize

      128KB

      MD5

      b9a71007279dea4f7c924b01027c94cf

      SHA1

      21a66ac80dd0476fd3ec46f900344914d4075000

      SHA256

      a898cd75a3d21e4ec957530fe655bbb868e275489fb229a0ecc3576dc88557a1

      SHA512

      d8eb922c650d360061264f35e1ad1522e2b1adf958d2f1e47be91ecdbbfe679f1c3fc5de8e15db02cdb879e1a3ca1f606d57efc99dbc43e5860ef9a169b1fae8

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      9e8ade10fa7108eaec2ad5a6fef33102

      SHA1

      a3955d44e4b501f1891f86f45601c23a46960de7

      SHA256

      00e456d539ddab3201d22537bf77e29c98c603286d52143b66e20ec0e2bef9b3

      SHA512

      88318dc77325daea06a7029693920140bbd71c4832ab106cc78b384d882876abc6079b9b91ba7e0a0fca48eccf5abbef0e9243428226db7eea6fbcc61b4eaa29

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{5D487EEF-AA21-4AD9-86E6-CEF18C2F4963}.FSD

      Filesize

      128KB

      MD5

      a45f0525a68d77e34fa92ee9e3af3f3f

      SHA1

      bb299bc24dcf949278af0e56482ec42c8892c65f

      SHA256

      7f299845d1ac70d59024a305eacad9cdc0d135325d0c3bf9e2ba5ecc6747c603

      SHA512

      99af5b23d22e0947a20d0f440206e9bf99907aa402585998cd47dc06c4b368e32dd8ddb7ae0e34a64f243e93c646c1779f3ea3da4aefc6890fb19a76a020aa13

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNQNAXHS\file[1].rtf

      Filesize

      8B

      MD5

      43d35b5b20f491be219ab2eaa172ec55

      SHA1

      1327f20512762a533c22fe181be3fcdd29ab76fe

      SHA256

      1955c6914097477d5141f720c9e8fa44b4fe189e854da298d85090cbc338b35a

      SHA512

      a721f07b2aa9c5d723a4b11575a602e94a7973278e62bcb5b54d4a48b5adf1bbe3945e5250dd0ccdd8b1b683b864f8c8b98b7c160118ed84846de085eb1d3666

    • C:\Users\Admin\AppData\Local\Temp\{F3197167-6A97-4510-90F1-45EC8A462847}

      Filesize

      128KB

      MD5

      3e7e925bc787ed2b83e12f1d9f0213ca

      SHA1

      88ced0c6532f399873202f7b7abf1232a0117ec2

      SHA256

      61e302d7ad1b346a52ace739af498c9f7deb7e8d9fcaf631d2532d98051a78f4

      SHA512

      441dbefe4874d4b3bf0d9f68ffb4c800787c23f6055ac85321e0ca58e1dfe676b20c65b6fc4632af0d91c3413043c9292d9e100701e18a13b9ebfe6ff517a5ae

    • memory/1164-0-0x000000002F541000-0x000000002F542000-memory.dmp

      Filesize

      4KB

    • memory/1164-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1164-2-0x000000007115D000-0x0000000071168000-memory.dmp

      Filesize

      44KB

    • memory/1164-124-0x000000007115D000-0x0000000071168000-memory.dmp

      Filesize

      44KB