Analysis

  • max time kernel
    125s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2024, 13:18

General

  • Target

    76eee4eb67cc1ecf8bb73959201d22a243e82f259eea0d736822327d95fed3d3.doc

  • Size

    65KB

  • MD5

    dbc07315c0eb47b067a5abf6deec6ddd

  • SHA1

    e837e110f1a762fce0d28c249f357b16fb17e3d1

  • SHA256

    76eee4eb67cc1ecf8bb73959201d22a243e82f259eea0d736822327d95fed3d3

  • SHA512

    3c4e1822248c0a21787371c2409aea639749bf5f90a3ff928918f850c7a12a880c5cab169728cff61f7f12349cd7c4aa3ce23004bbac9f021fa8575b76ca73f9

  • SSDEEP

    384:bZ46uvdXvlDA2EpqzGvKhIhnksssssssssssssssssQsiSv7I3fyt91bhd4HDTj/:146uvlvlDA24gGGoI2HbWHjYD7oz99

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\76eee4eb67cc1ecf8bb73959201d22a243e82f259eea0d736822327d95fed3d3.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2188

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      22f713f0d498f080c994414cd5cde17d

      SHA1

      8ceb0692eb005745ff0f1a0283e44cd275eb0205

      SHA256

      8e04c7491fc1e648478451d7c2cfd4b14bf1328baada26dd7ebca74e79571a9a

      SHA512

      b94f69f973bfaaa41d085bab1d7d529e914f602806e62dca67b88e80d146c9f1e25d387a1bf3b503a075f6b94c5bfd58a0831213b4636cb8d8dea63c9b6ba3f1

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{3BFC85FC-BD19-4EAA-8EBB-C4F24A7DF0C5}.FSD

      Filesize

      128KB

      MD5

      02a484d06ff38d5d9cb1b496c24e9a7f

      SHA1

      480d93325812f1534e7ee8e3513e682219e4b688

      SHA256

      613b78c3528bff214ea5252f24d381388214b5ce4ee94577cdf5f10644a7b9ce

      SHA512

      86a482320467280263030e3ad99f4b5294f7b2ffb1da9e8d6a28def34a33f135d672668c384c617fb7505e4daa1ed300bccbf6f291da55f69a86a32542443501

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      826a112f38b44b417bc798434951f7ed

      SHA1

      a21690c8739bf3e77d8c8bfdc73afdbfe5194920

      SHA256

      f657d55f8d3c0e7680fdacfd151f5b9b667a403466fc27593f117921017876c1

      SHA512

      abe3e72258078641aa147b808dabfdf1dc951f2d60526a4fefa9fb95663aa71307b0fb743973fa8cf2923e0630d1eb574fa2ae32ff03edd87827865a197f007e

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      dd42d0c3aab117c573c98df066779016

      SHA1

      ec55a5e36dda72c468d2857e7c5310645d3b56e4

      SHA256

      17adc1fa1471ae472eb75a2371f758435045747638a6d47f1e202cbe8a3e0feb

      SHA512

      8c88ffc6be181ccf71402c03e0272a695982442ef4b341fcf32454f047cae12a2b0b5e6044475e95cb511017e3bc9782ad1c3cc214c632e40a8d37ec76b50442

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{0FC765BD-AB93-49DD-9C95-5B363921FA47}.FSD

      Filesize

      128KB

      MD5

      45d23b1e7e4af3bd5074399c62b293e3

      SHA1

      c9ba5ebe4f6b13c10bb371ddec43b64ebeae7838

      SHA256

      ad9ee8ff60978c7a68e08a646e502bb1e6020b846481d4c2c848a9991eeda0bd

      SHA512

      16d423c52ab88f9c1990df98ffcea698618c85dc39b500d16b8b767c9538ec9b55cce4142eda9c2cce84b975dc6fa3e69f35874643f6595f449fabbe06e9bbb6

    • C:\Users\Admin\AppData\Local\Temp\{7C106063-E482-4569-A225-504837B97E76}

      Filesize

      128KB

      MD5

      a3bb80f19eb506fe4717ed218a4c900b

      SHA1

      a617058546ce5d637d300225bcf98598ebcfb6b7

      SHA256

      a77f22ef5f2c306bf46209664fa9ec05dc8552adc7e658fdaddc2612c3cfc632

      SHA512

      938b956b211239fa5179fb74ba61159aa417510ad078dab7c19a2d1f607c25e940879835bed9cd19ddb0704b3dbf5cf6bd5c04f8621eb8d89aac3708454d7796

    • memory/3068-0-0x000000002F0E1000-0x000000002F0E2000-memory.dmp

      Filesize

      4KB

    • memory/3068-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3068-2-0x0000000070FED000-0x0000000070FF8000-memory.dmp

      Filesize

      44KB

    • memory/3068-68-0x0000000070FED000-0x0000000070FF8000-memory.dmp

      Filesize

      44KB