Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 10:33

General

  • Target

    404ed6164154e8fb7fdd654050305cf02835d169c75213c5333254119fc51a83.docx

  • Size

    35KB

  • MD5

    b437316a4797f59dd3b624f660cd1c88

  • SHA1

    e6e6120de34986c862013067dd5318cef57139c6

  • SHA256

    404ed6164154e8fb7fdd654050305cf02835d169c75213c5333254119fc51a83

  • SHA512

    7893a1563ef252c717c0f6ece54d61474973b7e89b68f63157943e4665bd97a59e4680c355b962a615fe23cca44891cd5a9a0eaccedda11ff095a1f16f919df1

  • SSDEEP

    768:MBTfe3bHKPC5x7VvXQbdu7H7AsIly9ndXRLbq+5SpYnM23:ifeiC5JVfQZu7HX9ndBnqrpYM23

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\404ed6164154e8fb7fdd654050305cf02835d169c75213c5333254119fc51a83.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2128

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{A44CD336-353F-4350-AD90-F56ED6E0B50E}.FSD

      Filesize

      128KB

      MD5

      6fe8341a20bf04ea4470a894af0a7abc

      SHA1

      bd8e168da381006acf6720550d41316efe7a224e

      SHA256

      e0e70c0429fe6cddf7b3070386d249ef1ae228a76145003a0add95a4576e2ac3

      SHA512

      c72535de30f7d83fd47c40964051d0b719b4807276253356dd41b1ef27184c94ea64d68472025e2beafef1cfe30976f8adb75fae90178d21938d8535e02b326e

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{A44CD336-353F-4350-AD90-F56ED6E0B50E}.FSD

      Filesize

      128KB

      MD5

      6385d6df8ebb99ac90ef33506239162d

      SHA1

      b225104650bfc6e67ef435cceb837a200b21498b

      SHA256

      fd03b840be966b17d60d23fc64f4c1807eb0e842334276844113e638324732cc

      SHA512

      0dbd9e514b804d7210bb106868105031a83f3d3a9b5dbac466e1d4ab9c7b28552d9f40f6354f9e01af4aaa69ab090a6c180b4dd232a86c4590d2b645211b3269

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      4299f87fdba3080e4bf4844c21bd2503

      SHA1

      805f891de580f2ab9ad440ffe9f60eb01231947c

      SHA256

      bad244c47aae954b32abd46d5ad0d5c8fc95147b1112bfddc14432a6a1d35c69

      SHA512

      174b6d6836115e51fd0b77ca07fe2c961c6e0c7a37522c5a3ac6d69594dcbfcdc5b50de5a1d8165916a0444118e766bfb76715ad97742a1378c28092d9a51446

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{43FE5B9F-3A43-429A-B2A8-41E28928B56F}.FSD

      Filesize

      128KB

      MD5

      42942f7f47c204e723bee24ef6522598

      SHA1

      6039c924cd3ed5a464bb02392f8fc11149baceea

      SHA256

      324c27f5b7c4bc3266e73f2d148543d9b5fdf45499ea1bd62304869affcc9687

      SHA512

      7046d853faf7a90474056c8376acffca1a0fee598a0eff94f393eabf1e0dc5ca8a9a3afd2313fb639b0bf028564d26b6bc4d4af52c0d6abc758affafd3bbe4a9

    • C:\Users\Admin\AppData\Local\Temp\{FB9AC2C3-B5FD-4AC6-BBB6-4B19711BC624}

      Filesize

      128KB

      MD5

      5c2cc309ffc28662750a64070beec40c

      SHA1

      c5191dfc1836ceae5fa479f26c719d0792c6fe45

      SHA256

      ecf322f98bd8aa372e8d115ff00cf96a93f3fe0a659216c488df08a5da33bf17

      SHA512

      d86c83c2176fc09d6a517adea308feacb99d762c4d7c6e0d21a8be9546df6e302ed24de397fbcc0a8d1e566b7faaaae33bcf15ea15965a53ab1c535c2bd4543c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      2e76789cc831374178c68bbf7536735e

      SHA1

      43b46d72d58f0e6e5a47977bddbdf680b5c083c2

      SHA256

      de3e3ad8a0b8be28932f21e905167c8532a7206baa642d4a62b26564af313405

      SHA512

      da90a21c08201cdf10121fadcb001c03e1696a165cbfc9da3eb0ec8ba2a984d52468f8f810462e699cd991127c9bda7bb75aee59e9e1f7c471b29771e6f2fcdf

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2924-0-0x000000002F781000-0x000000002F782000-memory.dmp

      Filesize

      4KB

    • memory/2924-2-0x000000007171D000-0x0000000071728000-memory.dmp

      Filesize

      44KB

    • memory/2924-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2924-80-0x000000007171D000-0x0000000071728000-memory.dmp

      Filesize

      44KB

    • memory/2924-103-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2924-104-0x000000007171D000-0x0000000071728000-memory.dmp

      Filesize

      44KB