Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 13:55

General

  • Target

    bc9d4eb09711f92e4e260efcf7e48906dca6bf239841e976972fd74dac412e2f.docx

  • Size

    36KB

  • MD5

    3b853ae547346befe5f3d06290635cf6

  • SHA1

    dbdc7073a29e53aa16340d0c3da22680168aea94

  • SHA256

    bc9d4eb09711f92e4e260efcf7e48906dca6bf239841e976972fd74dac412e2f

  • SHA512

    716fa2bf5017c03a664cc300951a546c5a198334d7f36a68e541bc8dbdb408b9a49cf6bb4a738b036da77149e617c0079cb095107a4b96be90444e7d2ab6991a

  • SSDEEP

    768:gXs7D7R7l3Dkd+d5pCM1OpoeySh3uJvPtKzggQpw6DF0v66vJDE/i6I1:R175AcHpSoeySVG3ggN/Y6RiZ

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bc9d4eb09711f92e4e260efcf7e48906dca6bf239841e976972fd74dac412e2f.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2676

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{C52B1793-6B7D-4C16-B78C-1605390576CF}.FSD

            Filesize

            128KB

            MD5

            67ecb5c5dffc0ca9a43844f5a7c646c5

            SHA1

            4cb6c3af820df4c9f60e344d3de76004ff80bbfb

            SHA256

            3cdb7b120c00c46573994c5bf87a854d877e796a3984523f8f0e42033a4b8bf3

            SHA512

            b69e2a64e28345acb816a6d65472eb352b1c896496e285f2f8c74e11100a727a14b3f6eac76f1425a7fe922b16fdc569b20d36ce465a84dc56a3024b47b10160

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            f4e2abe6a90044b68ca601d98d4bb5ac

            SHA1

            c34c1dfc6fb38933895d35eb9060861d5e58b420

            SHA256

            48fbe22a9428ae209ab86d3fec3c4579e3a3184716a98de7a1993e3987c843f6

            SHA512

            3afc208838bc0d7cbe049b4d6af0fa65d160bf83a542ecea11dbecb2dbe911ab010c517bf60b0572e2532d10150191d487280ca5ce2940c7f70932dc440f6471

          • C:\Users\Admin\AppData\Local\Temp\{7E458C98-8F7D-4289-B9CD-33FB8A6DDF27}

            Filesize

            128KB

            MD5

            650f039f6b630b4318d56cd144a4a73b

            SHA1

            67162e50cd5d985c64c03dd2606dc2ad09ebc1fa

            SHA256

            d032cd2701d472e3caac6618ef7fa67ad512126b0624b9d65da5369cb7d84a94

            SHA512

            cebfafca3f938dc5cea3cbc939b1ec0c15f4325b61ef98aaaa9f9a752fabee8bb7d8bc9a58df6433d839f723598d15fc09c3bfec561c84674751d02e2bac70c5

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            6b5ae9612ecbafba83d954e5be2826f0

            SHA1

            d4fc6e29fa8a5236fdbce0c0ea6d675bbbc3a2b6

            SHA256

            379be441a9ecf431378c2e8bab07361ff9eb5baaacd712c224ccef99f33e3bb3

            SHA512

            0faf9944938e653de35224ed2ffce88db71acb66b957b47bf6eec6aa9f9448137907b7523c238738145e7078b1c7619abf096a407785aa782a479c8912755ae2

          • memory/2364-0-0x000000002F0A1000-0x000000002F0A2000-memory.dmp

            Filesize

            4KB

          • memory/2364-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2364-2-0x000000007126D000-0x0000000071278000-memory.dmp

            Filesize

            44KB

          • memory/2364-77-0x000000007126D000-0x0000000071278000-memory.dmp

            Filesize

            44KB

          • memory/2364-104-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2364-105-0x000000007126D000-0x0000000071278000-memory.dmp

            Filesize

            44KB