Analysis

  • max time kernel
    130s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2024 01:13

General

  • Target

    Challenge_FIles/Employees_Contact_Audit_Oct_2021.docx

  • Size

    12KB

  • MD5

    d5742309ba8146be9eab4396fde77e4e

  • SHA1

    8aaa79ee4a81d02e1023a03aee62a47162a9ff04

  • SHA256

    ed2b9e22aef3e545814519151528b2d11a5e73d1b2119c067e672b653ab6855a

  • SHA512

    37367ea06191c8a949f6c092bc4137736b344cc9892bf8a19e149557919d9276fb1301009a700cede0f2ca05d6827c827992817aee7b8968a5429e433fe0c8ba

  • SSDEEP

    192:60L6GkWglL+bzW6mlHRrZu87Fym3tZknRIhRHNwC3Eo+ETdlexwDvx/jVm9CoDFn:603kpLTZJHm+Eo+ETd4weCoDFLFd

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Challenge_FIles\Employees_Contact_Audit_Oct_2021.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3008

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{E3F04C8D-A647-4D76-87D6-34633079AF93}.FSD
    Filesize

    128KB

    MD5

    26c3243c5a4ecdd37a72188976f8a07f

    SHA1

    4ca5583950583aa335423d0b12d16c8c8221383d

    SHA256

    d5af99dee7851225946b8c1b26914dc7c964ba9118bfd5161a8255a87ff49b49

    SHA512

    34301d8ce3b836b88c0eda80e1e401325f788694d2ea7d4688ee345cb382b96af6b64170791eaefeb4c09da5cf9b31043364e7928655f7603db62277060da06a

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
    Filesize

    128KB

    MD5

    6cddef2a38b43208b20d005f667d8c82

    SHA1

    ed05ca23a37eb556d5958d596af03917c2be887c

    SHA256

    cc5d3098ccace086a9fb3ea3a092761337e1508957f2430e598aa006562a27d5

    SHA512

    532c6b0dcfa34f44bbb75ce054466d5383a9423879fe0139da0168b3e987a0cf67943e8a3092368fb9724d92ab78b974d562fd081248a41697d0f674ff047a52

  • C:\Users\Admin\AppData\Local\Temp\{EB52117F-2B9B-4C26-B95C-651F17CA9DC0}
    Filesize

    128KB

    MD5

    f5b932e3d662d9a27315e02f88896f57

    SHA1

    67c9f4260a02c09fe28473dab0f69543a8e4438a

    SHA256

    f77a214b3d2f99e8cc2c859b924ec4dbf969434b0ba250c7f112943aa642453a

    SHA512

    402ade09f97567b9c560b795f485040ca73f3354373dab39170460a6167b8989c96e06631c2f82a424b94cddaa779827e4e7cd5b01f8b88a3680a0cb0fe053c7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
    Filesize

    20KB

    MD5

    bf0ca9c0659777c893db33c89084aa27

    SHA1

    0fdc70c399406c6d33591eccc29aed2d16ce9c47

    SHA256

    0d15d6258653c4524cc9b26f3b418bfc6dd52dd7767958db3b8a8113d9abf9ed

    SHA512

    3c84977e9d70c73ae170b1432134ccb16f5e612d8cc5ea670757984c4c6d48ff78794cf3fde8e57b9bc1bc59cdb6d427815c683c2c6bcf0e0cfbddf92c2ffac3

  • memory/3008-0-0x000000002F701000-0x000000002F702000-memory.dmp
    Filesize

    4KB

  • memory/3008-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/3008-2-0x00000000712DD000-0x00000000712E8000-memory.dmp
    Filesize

    44KB

  • memory/3008-10-0x00000000712DD000-0x00000000712E8000-memory.dmp
    Filesize

    44KB

  • memory/3008-91-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/3008-94-0x00000000712DD000-0x00000000712E8000-memory.dmp
    Filesize

    44KB