Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 11:46

General

  • Target

    6ed3447bb9fcb5abfe78a628ebcd1a0987c75b18eac5673a3a90a4bbe745b527.docx

  • Size

    60KB

  • MD5

    5144a35d9f120339b8374177714e199e

  • SHA1

    ca0051815ceae216e467e25d7a6189e3b9a114cf

  • SHA256

    6ed3447bb9fcb5abfe78a628ebcd1a0987c75b18eac5673a3a90a4bbe745b527

  • SHA512

    161799858c0b1c90cb876fb230042e8b08169d2b533ff92cd80165b20347d32186bdd520fd57de0de4e59dfba2e22f77642804804a74c50a38066245c74909bb

  • SSDEEP

    1536:b/pPC106sReBofMg0ghHmhpZbY0j9ABPwo:b/IJ4qCGhpZE0j9sPwo

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6ed3447bb9fcb5abfe78a628ebcd1a0987c75b18eac5673a3a90a4bbe745b527.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2472

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            c4b7575f410745589cb26244d92cfe5b

            SHA1

            39e52ded758ba34c85624929e6aef46117f14436

            SHA256

            11734acc7112812bd53c26b5d7a00b6db166ad8e00a064ad0982e87d0fa5b6b8

            SHA512

            a71eefbd29e99ee62ef683bed8cd71ca5f6631fb05fbf0c483473d4daf46f43d9a981223a6bc2980394f5b2315b96b57a24cb4e3e62d0be0b406074fd9f3c48b

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{42D9DD0B-7C1E-4F4E-AF0F-E68253BE5869}.FSD

            Filesize

            128KB

            MD5

            e769ab9447eaf37b0bbb715401e81a71

            SHA1

            91f199b14ec12bf5d9db4756aaf5c48b47be7414

            SHA256

            be514780fb71c62591de0c43ebe4422cfb8aed5e71af7f9d6eec51791c750da6

            SHA512

            bfa8c9866d15c26892f9299207c33b29db10d605108fae06bb1fb30033bc83b96a126435ec04f5aa6b344f07177ed22078e50624d99b6c14df40c03e002f8f84

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            a16c2da06a63e79e301c5c62fa2be7c4

            SHA1

            a8a83123f13362464715ee135ecb58940c81b26e

            SHA256

            feb92c8c9520173284deebb19514fff047475741eda9d69fd009ad391ae236af

            SHA512

            7f4aeb895d61928b24fb88d2b3af052aead1e930becd3a1a8cae5b2855c47371f5f186fc9900c6777b84a1b8276863ed4cc0a0b7c246cbd4d4729dba3199bbce

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{1BAEF5B2-22A1-40E3-ACAF-102E91758B54}.FSD

            Filesize

            128KB

            MD5

            a3f79a545a30aa0a1da8bcfc3300b9df

            SHA1

            448260f8f71cf229fccbabb0a023f45f594a4a12

            SHA256

            5640fdfe7b017dff9b03265e260bd151f58b38f1d972257e6ea663fe3c3ee3c6

            SHA512

            cc788bfd717ffc0034b868b5923b2fe770ebda4cb63392ec9339464bc4be0a722b68c8871c494e275856dfc0c0474a8abebd2826c8f0f6490520839ac635052f

          • C:\Users\Admin\AppData\Local\Temp\{F811E5FD-38F5-4B75-8E8C-30ED4AEDBE1C}

            Filesize

            128KB

            MD5

            7611a88e91c224d1a18c3bd9828b5398

            SHA1

            3b1f27e157749ce5a7568469e334aafdfc977fb0

            SHA256

            9021a028326a9560326efdd6a3a1b47cb0d4ab51f246f4431d2e1ad577fb0062

            SHA512

            ae755a9d722af836a77c5de0838d5a471c4f2e93f507e327ce87f08b5b10bfd4d9698a697ad2a1bf733bce5f1cda3e42529808f4209d55e9350b255c8590650d

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            b43b11aa816e5395f17c454e7a098c5e

            SHA1

            4e6a7897dcc50ffe4a37654b883d9d9507722d03

            SHA256

            03aae26c0afdf047646dc4dbf89b6b585fe535423aed7b4eb4c34ae7190a7771

            SHA512

            4a2f0088a985be5cdd04b5bf973ac2a566e3ad2a7384524dc9e5e76387a6e844757dbf268163e94792829b1af3f45da551317329b3076bdd4a2b596392ab1210

          • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • memory/2336-0-0x000000002F661000-0x000000002F662000-memory.dmp

            Filesize

            4KB

          • memory/2336-2-0x000000007199D000-0x00000000719A8000-memory.dmp

            Filesize

            44KB

          • memory/2336-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2336-80-0x000000007199D000-0x00000000719A8000-memory.dmp

            Filesize

            44KB

          • memory/2336-104-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2336-105-0x000000007199D000-0x00000000719A8000-memory.dmp

            Filesize

            44KB