Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 18:20

General

  • Target

    Offer 15492024 15602024.docx

  • Size

    410KB

  • MD5

    0d0f500d82551e733eab0fb1060a49da

  • SHA1

    1e9af5dd484358b007673b0d7f9b85f8ac1a7b6c

  • SHA256

    d5e214f3096564dfc3e348b6a3ac6aeefed75d785ac7cfab5d3019f67fdbc9be

  • SHA512

    79a0847d2d3d8399796365bd778785531643506634d64302a075fb5ee5206564a0d7d03b90e38f55c55e441e6bfddcbb1035a452123a8048044588cbfca16f82

  • SSDEEP

    6144:D/46IX/fLf6fwf2Q5OmfRfufffXFO6S951ndPJHf9frX:DgvfLf6fwfdOmfRfufffX4h1dPRf9fr

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Offer 15492024 15602024.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:908

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{0EA7FDBC-E735-44DB-A7A8-6D5E16EDD219}.FSD
      Filesize

      128KB

      MD5

      c15e1daf9d70335474d3bff977ec9a1f

      SHA1

      6d435a1afb0181393332b250c1288b9e2c6584e8

      SHA256

      219065e1ac1052ec7bb26d1ebb7dfb4309fda5eae354a37f011b6ffa2ea35277

      SHA512

      1f90dfda785bd6af415e8aaf0d62ed11090031b598ef4bbd00989b564b3ec3766170efe4c5147e107a6d11c052e681ad14800fdf0db2f16d30f28d777ee3aec9

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      c5614dd701dc0f21bfd21aad948d6641

      SHA1

      ada2ba34afbd7037bc950a05f609a9c985585a4a

      SHA256

      e0ea59ba5e595fe3c2eebc319f0a6ec083ac2b1acdef0b311b11359a88584cdf

      SHA512

      f0a49a5263db02f5e261af0405305e0561053ad0ddffe969cc981922906005447eab71cdd1d3399f23b5aface0d2dac15e3fd53526ba4620b8cc7942b75ab669

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{FEEFEF7D-90D9-4368-985D-EFB79F8F3060}.FSD
      Filesize

      128KB

      MD5

      da72b40936ca28e7f0d213350b8633e3

      SHA1

      27c2674dbdcd8e9979374db40d4a5f23adcce1fa

      SHA256

      24df369f73031b8883e353d21506ad3c45dba025eebb515961473e6d59b173b8

      SHA512

      330cff07a5fc6339117bb9a565b1d02b972afbd0feb2fd2b9be5c7c2fffb34bee58b0bee7a8460e17882ba5a36ab837233f7abfcd0c25a2c429b2ef3447cee2b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\56EE99FF.emf
      Filesize

      1.4MB

      MD5

      476c7c2f309c957f6428d04e94c4f64a

      SHA1

      f1b0fa252babfb7002dc87069a436ad71bda532f

      SHA256

      c0da66b866cc999aee20456c2eee3eefc05046b8f5df3755f95fecb85f9f8be5

      SHA512

      c941fbacc6c98b556ea742538b2f2c61a66be677aa5f97457dfe07ea9652e17fe545ac05740f8ed20b1449fdcf38e97c49fe73ff8d53220a4e8d3e6e3615854e

    • C:\Users\Admin\AppData\Local\Temp\{91C8F3FE-ECB3-4719-A3A3-019702865D7F}
      Filesize

      128KB

      MD5

      b067d7c065032a5afc71a7e014f71310

      SHA1

      9a5f3d777e845870d8935d927e92bcffbb546ff6

      SHA256

      d6d9e6cfd3b38073b0dcc0aed7b7b5a262c5f9d1f51eb9733599c63d9ef9d86a

      SHA512

      e7789f09da35963a37e639eb5829286371927f5ddfc3626e6e51ace85f991b6ba466a98693300a56b8010367d04fa347b5a0d8d3b450da5d75768879f26fa57c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      76376ecc138189ef596011432455890e

      SHA1

      08e1c2104c1a24844eb7d4b435bd2b32b1ca3fed

      SHA256

      ead28ee1ca45e4fec74b9e012ef9b626e78408b4c4b9bb48b45773af05ad2539

      SHA512

      60678037c44320c742ef76e99e23e621454ecf0c2a1d9b5e76952c931dad759569b532ee85be8cbdd321ee023d83d7db9214473211d11224d127e2e842a76ea1

    • memory/1936-0-0x000000002F521000-0x000000002F522000-memory.dmp
      Filesize

      4KB

    • memory/1936-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1936-2-0x000000007101D000-0x0000000071028000-memory.dmp
      Filesize

      44KB

    • memory/1936-249-0x000000007101D000-0x0000000071028000-memory.dmp
      Filesize

      44KB

    • memory/1936-272-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1936-277-0x000000007101D000-0x0000000071028000-memory.dmp
      Filesize

      44KB