Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 10:34

General

  • Target

    4214ea1a7884ba70470ddaaee363f11c39e5aa35df13f2527bdd14d9545c3f57.docx

  • Size

    40KB

  • MD5

    e2c3a6bcb015e2e5137d4a46881d38b6

  • SHA1

    a9661c91dd6ff746f2c9e69efeece9f989bf288a

  • SHA256

    4214ea1a7884ba70470ddaaee363f11c39e5aa35df13f2527bdd14d9545c3f57

  • SHA512

    20884ccb34d1994f306b3cd93f09b254e1b8f6c1bedc12bfdf00b4b8f5023e5ec935509758e9c9e9d510abbe109217ea7db3282db26012bea4ce6351d6a7ce5a

  • SSDEEP

    768:zYkm7ZwpaU4UE5Xjdd8Diiubc7EcZ56Rb+ZBLolRW74l0+gtbeeJci9z1:sFgiZd82LQok5612BLSnSbBci9x

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4214ea1a7884ba70470ddaaee363f11c39e5aa35df13f2527bdd14d9545c3f57.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1032

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      8e9a9e94193b9da633b935f9067e8af9

      SHA1

      585e403f7c2e8b1132368386a99f7f15fa3b5ac2

      SHA256

      8c6ec4312d7bdbc7e037974d09f83299d0b9cd89ce7abf0bb0280c2cfc2f8366

      SHA512

      0f6f15842f8a6a787991f05a5dd741ecc235232e4eb0b766471966949a67b325cf0092410cf0275bea2053000eaa28bcfae2b12917f127780f6b225a85a46ea6

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{825EC33B-3F0C-437D-BA01-B022FABA0835}.FSD

      Filesize

      128KB

      MD5

      121acec776b2280405495a37bef38a35

      SHA1

      24aba906af1a9ba32a81c30a0f36816a9bb16b63

      SHA256

      9e8728cf3a635d8f7ff366a8939f9f7562d1200e8d02689b863e40d4f989aea0

      SHA512

      76ac201c9ee9d445d567a162207e5aee8d11a7789f0d35b5e4e6ce2c6d72361106a3f89babfbb5ab7cdfd9d6f3c044fa2de4a7c2e8ff38028e5a711f25fb00af

    • C:\Users\Admin\AppData\Local\Temp\{D60208C9-BA3F-445B-99FE-A76564EB6CDE}

      Filesize

      128KB

      MD5

      1db7c7c6f5dc7a00039ae05c8d1930d7

      SHA1

      bc867e85c69185e66875364e19bf8a14163e5a94

      SHA256

      ed9b136f44cd9e84239aaf616e397dbeb6803f041ea0293a061356a3bdc061b7

      SHA512

      aae5dc7aa642abccda84e605fe824d7d1252d721d46c862c05a98a39ce96a6f3554a559be6242bdc086bc6d454f624ab0319ea008f8c2f566e9d71ab678a21f4

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      de552fdc9b8210e0199d4f74bc500e19

      SHA1

      b17789998b005477ce1d3c674b4d24850236724e

      SHA256

      aa9d2e53c41a30a9527c5290660378f4d198a766edbd232e604e414395a6a3b5

      SHA512

      6a0ce8ea368a0b4d39a6050b4f7d9534b0e436440e549de735d9814e8ca2bce4d3ab6f5b03bb4308639a9ab94e68885d3c50ee1e7232773100525e26a33afb62

    • memory/640-0-0x000000002FBF1000-0x000000002FBF2000-memory.dmp

      Filesize

      4KB

    • memory/640-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/640-2-0x00000000715DD000-0x00000000715E8000-memory.dmp

      Filesize

      44KB

    • memory/640-68-0x00000000715DD000-0x00000000715E8000-memory.dmp

      Filesize

      44KB

    • memory/640-92-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/640-93-0x00000000715DD000-0x00000000715E8000-memory.dmp

      Filesize

      44KB