Analysis

  • max time kernel
    135s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:12

General

  • Target

    049261b1ba10fc409cebee2220f6c16b66a24d45fdf51a8613c6be0870ff2309.docx

  • Size

    10KB

  • MD5

    ce5512a94aa59985b3b8f371a0866da0

  • SHA1

    0dfb6f37eb2eb1badb8ab9c0754de0874f4fcfd4

  • SHA256

    049261b1ba10fc409cebee2220f6c16b66a24d45fdf51a8613c6be0870ff2309

  • SHA512

    eae07e86ae5dfdd15cdf74dcd2a17502cb8e59fe51aa1d6f64c8a7a14fee8a435f9082a25c9e0566a47765d992037851bc929c5eb53ca80c461327d0a3c973d3

  • SSDEEP

    192:ScIMmtPi95kG/bGv7m7sOVIOdBf0krFnuTE3dz5b:SPXIBGv7jOVjvlrFnuInb

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\049261b1ba10fc409cebee2220f6c16b66a24d45fdf51a8613c6be0870ff2309.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      5c9a640e91d3bf4124bdbcdd08f8f569

      SHA1

      b77303789fe22ef2ed200be93ef72fc72ebbef3b

      SHA256

      fc67e3dd99539cc180719ac328de039b9273ed305ed4df9979bcf7287a43de7d

      SHA512

      a905ad2ba7e8b7f49ce883926c0a3da8a33f4772fc9033ac88fd2951f72272a0c285c60a61299aea951f998e6e4d8aca052c053e722fc78b21c99e36e6b5880c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\5x2klu[1].htm

      Filesize

      23KB

      MD5

      cfc39aea170ca3b4e33d2c2966b074b1

      SHA1

      5ef963126b302ff61c6087751e2e4be10074ce7b

      SHA256

      d8f0995eb3229a74c6a584363a6b2f4dd0ca90e1828207570a538ed0459d5cd3

      SHA512

      a0ec7a4ab0dc9ea381027fa389b8dd0b6940136a90858afafe38efea629d8c89000bf8c595541de6cd48c8367e956b260d6272f79dfb9a3eedc1370e6f61f984

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CB011AC3.svg

      Filesize

      46KB

      MD5

      5a2c392e7acdf6e9de6e00129500503c

      SHA1

      c8d0f80381e4ce180b5eb3c4c98539907292a7bb

      SHA256

      878da09a057ec8f1775cdc522e5f7ec44966df547a87a9c29826ba114833c24b

      SHA512

      52223b04eb9121f05442dbc48519a95fdabb81c414772ee43dc837b58f797b97314796ef6d77ea6b7a1f3fee5937ec039e617fcdf8b146822792accd2534e141

    • C:\Users\Admin\AppData\Local\Temp\CabF73D.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarF76F.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\{7AE79BFB-C61B-4D42-817C-DF9A82876D57}

      Filesize

      128KB

      MD5

      51dcbe3fc955602ea494e3b966fd5a59

      SHA1

      bebd371606da04e607f7515abf6b28024a6d840c

      SHA256

      53a41a432fd70a6f50be2739f4c4dd5239f7fd70278d0c165653d7316909e823

      SHA512

      fb768549cafd4d7154ee8c9e7693d3b468a2d772a7bc3432b86f204511a8922dda87ca03e4d25fc7dae31157bb04fc70311a94daa05719a1e5888f4808c3e5c6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      365B

      MD5

      934e3e4de5b2af6f041525ca7e0d2161

      SHA1

      86f566557a5830890cdc9145ee3c25c2d7f07040

      SHA256

      683197ebf6edbad2b098086574161f38ca3bdd39005e04202243720242e48d19

      SHA512

      776b362a6a10f21834b36e295c5e0179cea874f9dd2559e6b79a4e130a0a29a6cc108ab5267f3d95151846435431e34e8eed82e0a1ec5b49945f35437b72e7ac

    • memory/1916-0-0x000000002F461000-0x000000002F462000-memory.dmp

      Filesize

      4KB

    • memory/1916-2-0x000000007126D000-0x0000000071278000-memory.dmp

      Filesize

      44KB

    • memory/1916-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1916-343-0x000000007126D000-0x0000000071278000-memory.dmp

      Filesize

      44KB