Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    08/04/2024, 11:19

General

  • Target

    POPN 04-0250-65-02-00-017.docx

  • Size

    292KB

  • MD5

    7f667b423a6f6baa211e2df5f98a3cc7

  • SHA1

    b7742a67091dd9aec3143316551c30c8a60050d0

  • SHA256

    9d6ccab64f90ff743adb36f9e82e94cd3e517f42937ba588380c362d82d8aec1

  • SHA512

    0e41925ebef3b0b1d5f8c761945e4575eb60a7f9b26aec69ef9724ba4a5558e0a8afa0eb34eb6cd419911b34a929169d8624e3ae9dc7f3314da7811e9d686fde

  • SSDEEP

    6144:skM543gJrxSWGkJ6lOmrKli3+hwYFqRHpPqVph0vy+MtaU:skMmgJlBLJuOt2+GIhEtNU

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\POPN 04-0250-65-02-00-017.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1396

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{6AA3A018-6424-47B6-9AF9-47FC7F18CCAE}.FSD

            Filesize

            128KB

            MD5

            fc7f5e6a56ef44b5027c2e03b5f51551

            SHA1

            ca263956db0289007e283191c8464eb4b1e175bc

            SHA256

            820ac02afc26050602b879c5f77fbd9252d9056cecf159fd2162606eff9702b4

            SHA512

            7a49a62340c68de1c4a38c38f39add3f9d21967c76f023d085cf344602135791e227014fbf8a050ef9c4580ee48ce4b028d20cbdc987c8dbf93ff4e08eabc7bd

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\46891CF.emf

            Filesize

            3KB

            MD5

            4a103fc1809c8ea381d2acb5380ef4f6

            SHA1

            6c81d37798c4d78c64e7d3ef7eb2acb317c9ff67

            SHA256

            1ab8f5abd845ffd0c61a61bb09bfcf20569b80b4496bccb58c623753cf40485c

            SHA512

            77da8ab022505d77f89749e97628caf4dd8414251cb673598acba8f7d30d1889037fab30094a6ce7dc47293697a6bef28b92364d00129b59d2fc3711c82650f5

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4ED70386.emf

            Filesize

            1.4MB

            MD5

            bdb651a93e94a128e9fc7fb1b71ef63f

            SHA1

            aff0794615a836dec0b72d8f6947a4178d02f52d

            SHA256

            4b18541f2c8d6344b62dec12138458e1649fea21c672cfda37b27afe056b9caa

            SHA512

            ff3bfd7ecf0c4662f6749f1a51894130db5d0406d5870711a481463d64ed5f89ae8f81972c6838922e69f70ae2c4cabe0b59341c7edb84f4c1d48d9fef130a85

          • C:\Users\Admin\AppData\Local\Temp\{3DE2531A-9345-49FD-B4CB-2BBB0547DAC8}

            Filesize

            128KB

            MD5

            174db726589c92c78b363a72b7b7b702

            SHA1

            245ebac767f5af9e044df84da31110888b0f51c7

            SHA256

            4fe2bfdb0df4df0c31d39867aff3e1b4a8e0eab84cf8c70a52689b1713191442

            SHA512

            e1e301c0d3d8e039b0f77fe339f748426355b8506e73283a840b4eb536bf017427708385fde73f3f2d091acf3fd29bf79adebc425d78ffc310f8b315edcf11a6

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            14e0fad68a93370311dcb87cfa616940

            SHA1

            013929ddb75a119d617f9b534d0f00626915ddf1

            SHA256

            7065fbbf7cd223c582e42f5e9a38066161426ad951d62ed0996a47998cfd5a76

            SHA512

            9882463a65357250e5e521cdfbf46d3f8b7da13e6354b33aff12e544850d78d60988ac3e8bb1317fd93e97e79717e18b9c3ca9447d2913e642b1ababc15f3483

          • memory/3048-0-0x000000002F461000-0x000000002F462000-memory.dmp

            Filesize

            4KB

          • memory/3048-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/3048-2-0x000000007163D000-0x0000000071648000-memory.dmp

            Filesize

            44KB

          • memory/3048-62-0x000000007163D000-0x0000000071648000-memory.dmp

            Filesize

            44KB

          • memory/3048-105-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/3048-110-0x000000007163D000-0x0000000071648000-memory.dmp

            Filesize

            44KB