Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    07-04-2024 18:11

General

  • Target

    Challenge_FIles/Work_From_Home_Survey.docx

  • Size

    26KB

  • MD5

    41dacae2a33ee717abcc8011b705f2cb

  • SHA1

    4b35d14a2eab2b3a7e0b40b71955cdd36e06b4b9

  • SHA256

    84674acffba5101c8ac518019a9afe2a78a675ef3525a44dceddeed8a0092c69

  • SHA512

    11f7177dc3c8a804ff6450477e15aadd20fddac98205008db25a4f6ef69a54b7cb7c9dd0d7bdf1b1d317f306482d86ad5ef150530194de7d8dbe344203962648

  • SSDEEP

    768:8HVoVneOa0HD/vb9EVoiJWq8UCei96T8vuX3m86RAFvg5e:8QVvbvb9wnIq8OitP88eY5e

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Challenge_FIles\Work_From_Home_Survey.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2020

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{5269729C-53FA-49A4-B895-5247723DE3B7}.FSD
      Filesize

      128KB

      MD5

      31705f10b2fc114df7acda2df38f56bc

      SHA1

      1560264f6ef70a75c6917b3e1c87b1afa0adb794

      SHA256

      6dfb6b44012a447bf540bc766a6e3fcfd5fd37590873630b9abb3bcd097b1f4b

      SHA512

      61dcb8f7dbea3a349c932e10b144f46a7925566f4ca6aa8c70adf3160172105ed426da6255bd96633d8a57bb15fd6dc8c73ab6ebf0c5dd82813b091f1339aeb1

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      394911f73baa63e2b71ca88de774ce9b

      SHA1

      743c19167b4c22b81f042a9ef4954fcb0bdb4fc8

      SHA256

      0630f694ca85bc48ab1fc7afa23e87d152710e27376ce7669f5ebc928574f36f

      SHA512

      2fd7fe4cdbb8641790cfd6e93fd7acb7ee029b11f7baf8c5dbc99b08c5d7324c32837132204babc0a3693e13517b1f19c37371119a5939190b00fa65f25ddfa3

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{38342716-EE14-4FE0-8C10-1CB724FF5125}.FSD
      Filesize

      128KB

      MD5

      aa054ab8ad6e797d52a9064016eba7be

      SHA1

      4d708da75b9d1f02935cc03c4b1edd1b17ebcccc

      SHA256

      e40b8b947a0c1140836a17850270d7b7d8a597616bcc09459d876d8129a6a09d

      SHA512

      5bb24e15a5d7420fb46a261e879b1aea60bfc06321be8364f6e3f653907525029c0a50dce729e05a6bea7633ea733f108eac743db596908218647ad19c951dea

    • C:\Users\Admin\AppData\Local\Temp\{68245F98-E1A7-4429-BB61-367C7542DAF1}
      Filesize

      128KB

      MD5

      9aa1e52b4f5fc28c14e8bb5f8a13790e

      SHA1

      e1d8334e1cab26aa61433dd9ff71205928e4f7d9

      SHA256

      a475d992f1e00bfdb472eebfc83aeac3d1c17a68b61379e05bdb4120db677fa7

      SHA512

      461afb03750af41d5256fde2081198d8c8b358a2b5d3378386280d534dad9849b5f454dec075acabb382ce29ba1725048d45f82128a23b06c5a4ce4060144890

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      d0b279c20e8a89503b704f295e89598d

      SHA1

      f383178f0a38f66dc8e8f01ddda84974c53a48a2

      SHA256

      28a6fd7ca747546a139c69aabbea96026123a88b7aa01c979e0dea2a8542f852

      SHA512

      4457e5ea119c719dc4b46bfd19fb3c54b79e62b20ce75e36bf423998553a4b276cf57afc410e10cda76f68631cc31f127b118666d33b40e4c377946923d251de

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2192-0-0x000000002F3D1000-0x000000002F3D2000-memory.dmp
      Filesize

      4KB

    • memory/2192-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2192-2-0x000000007125D000-0x0000000071268000-memory.dmp
      Filesize

      44KB

    • memory/2192-77-0x000000007125D000-0x0000000071268000-memory.dmp
      Filesize

      44KB

    • memory/2192-101-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2192-102-0x000000007125D000-0x0000000071268000-memory.dmp
      Filesize

      44KB