Resubmissions

10-04-2024 13:03

240410-qatxpabg7t 7

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 13:03

General

  • Target

    a33ccc612a03de4f42a6f5ab5277470f6a7e8ee7abe52725b13704366e8da48b.rtf

  • Size

    164KB

  • MD5

    4fd18a5bf162aabee21ce4c440cf6182

  • SHA1

    43538d9010462668721f178efaeca89f95f6f35a

  • SHA256

    a33ccc612a03de4f42a6f5ab5277470f6a7e8ee7abe52725b13704366e8da48b

  • SHA512

    71f36b5031e942572d2b6700d7b04bc0a0e2ed3f1fbc57b32fb509552c68712f9359cf4c2ef3a951d59b1bbdc6a17a5e47f574cefcfa830c8dfd51fd0d736d5b

  • SSDEEP

    1536:lFZprQi/+G/frRZDJka5ChRVDI6hNQAkdN0qlFn57+rzzvgBQ0OIAawNVF2h1xt:fffj8zjUFnx+LI5P

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a33ccc612a03de4f42a6f5ab5277470f6a7e8ee7abe52725b13704366e8da48b.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{1C7A3CE8-6D9C-4004-9AC2-1D45CF362A9A}.FSD

      Filesize

      128KB

      MD5

      bf86c15dc4889d2221d77b86ca960048

      SHA1

      1a5c80915b28f9718fb0317137df843ea58c944e

      SHA256

      14269e791f0d58f3d5c15aec53f87c4e2a6eca73359759e5b63a1aa93fa584aa

      SHA512

      e04ba826222afe80a8845915bb4aa603fb34c204feccadf811e6d02679b90a2d6232a34486a23273e17bb135593ff3b2eaac91ef23d9f9060bde4fe3ce5e077b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      a395dd645539c756b142c8505934c831

      SHA1

      4760f04edb4e485325cdcc484f679e7ce9965845

      SHA256

      bf8537c3f69b1b975d9f51b55aeb4e5c22cf64cca3e54ca833bf7700904a06e4

      SHA512

      80ab2da884d8f70574ba91a8ef1b9a6441d893f9d353f1de82b756d31c72ade6a6508db9dff7e75ca881412318dc0159d03a23cc99483f7d785990a26ae76187

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{DF153C3A-8139-41BA-9DC0-A73E83B98D26}.FSD

      Filesize

      128KB

      MD5

      62d55e69042c79ea9837fdc7a0def634

      SHA1

      f9247ac89f0fffaf451906757153cf026010e52c

      SHA256

      3b21e61ded8d09c484b6f8d0260260bdd8bac0bfff2d32335787af4472d40a36

      SHA512

      f3ab374a5f34457fc97ddcada986f94d36c71303e13bfa841bcf1415e20dcfe18e59f507505d697f816b65760a3af1ad36b642a78cfef21452e7bd088f8dbb7f

    • C:\Users\Admin\AppData\Local\Temp\{53064A96-F229-48BC-AA47-55B9FE4BDC49}

      Filesize

      128KB

      MD5

      134d386803f971ee6bd64b7a219d1b87

      SHA1

      db83c929d1154fce4d1aaeaaadeaddf21a917ee3

      SHA256

      e4254bcc5f76b41f07fd808b64101f4425f04b3eaa9def2c8edbd0f8dab9ba0b

      SHA512

      934b47e799756d0573f9f7ed0487d434d39096bf460c508736060d11caf9eb253096067918a8fa7e1d7b9b9ad5076dec29fe1f12a040c3eeb968b17cecdfdfa4

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      53db5514bf01035e8123e010f0099906

      SHA1

      eb5c208f767f6f74e70664d5171be36f57ce6786

      SHA256

      ad04400cbd8b7542ba91a128688c26372ad5f9ae0de82c146ba91a37c53c68db

      SHA512

      ce9b57084c470e66d65147fee79993457645b15d36a0a503d5b198d293ff1fe2292efd729a28b6958a777e74400b0c42d5496569e4b47cd7e87e7d178d101842

    • memory/2872-0-0x000000002F1A1000-0x000000002F1A2000-memory.dmp

      Filesize

      4KB

    • memory/2872-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2872-2-0x000000007158D000-0x0000000071598000-memory.dmp

      Filesize

      44KB

    • memory/2872-68-0x000000007158D000-0x0000000071598000-memory.dmp

      Filesize

      44KB

    • memory/2872-88-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2872-89-0x000000007158D000-0x0000000071598000-memory.dmp

      Filesize

      44KB