Resubmissions
07-09-2020 14:49
200907-6g4j1lsg4a 807-09-2020 14:46
200907-621166mbea 807-09-2020 14:43
200907-arlway4y22 807-09-2020 14:40
200907-2gfycfzzsn 807-09-2020 14:37
200907-48ed1pf1qa 807-09-2020 14:30
200907-nrhrd8w9xa 807-09-2020 14:27
200907-7xkbfnkxne 807-09-2020 13:24
200907-hmxpvsyqqx 807-09-2020 13:22
200907-y2l4q28146 807-09-2020 13:19
200907-snqv561r56 8Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows7_x64 -
resource
win7 -
submitted
07-09-2020 13:22
Static task
static1
Behavioral task
behavioral1
Sample
HRCComplaintProcedureForm (7).doc
Resource
win7
Behavioral task
behavioral2
Sample
HRCComplaintProcedureForm (7).doc
Resource
win10v200722
General
-
Target
HRCComplaintProcedureForm (7).doc
-
Size
80KB
-
MD5
a411bb05ee4192202c88efdbd54552db
-
SHA1
6b0acf8175d39a1008bf9fb0d3c45bb63a3361e9
-
SHA256
33a24ad4b225880bee5c9d40527022ea020daf2f6d7643269f4f739b3271f5de
-
SHA512
6e424b2c2a7881d4969ddfaef595822f3d987e8fc49f578118c6d4ba25461ef53613405394f4ac366606ecfda08ede4d22f436f182aaee82ba9b5f7962cce6f4
Malware Config
Signatures
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01b1b9b1985d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001b0829a874ca164698fa08cb019bbab800000000020000000000106600000001000020000000bfab941f95f3243f275860c3a78a25f52f54a0915b7bca005551623a1049e697000000000e800000000200002000000076f29ced70106e3c15f34b0a413098ec991c1948fa1c962561534259c291733e200000004525efcc7c712b062499b1056ab73ab20f4cd3a08cc3261a9b88b976e0e21b5d40000000cd49f1d677e170c7a92182fafc81b65e76922ec018009b97a00d976c2b2f4677b29dbff28834fbb98ac6d1399f370b69a11d3b5c9a7c414ce4322c5c3af2bd79 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "306249752" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C539C7A1-F10C-11EA-8FEB-E6D7DBB31841} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\.Targets rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Targets_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Targets_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Targets_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Targets_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Targets_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Targets_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\.Targets\ = "Targets_auto_file" rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 788 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
7zG.exe7zG.exedescription pid process Token: SeRestorePrivilege 808 7zG.exe Token: 35 808 7zG.exe Token: SeSecurityPrivilege 808 7zG.exe Token: SeSecurityPrivilege 808 7zG.exe Token: SeRestorePrivilege 1952 7zG.exe Token: 35 1952 7zG.exe Token: SeSecurityPrivilege 1952 7zG.exe Token: SeSecurityPrivilege 1952 7zG.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
7zG.exeiexplore.exe7zG.exepid process 808 7zG.exe 1600 iexplore.exe 1952 7zG.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
WINWORD.EXEiexplore.exeIEXPLORE.EXEAcroRd32.exeAcroRd32.exepid process 788 WINWORD.EXE 788 WINWORD.EXE 1600 iexplore.exe 1600 iexplore.exe 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1916 AcroRd32.exe 1916 AcroRd32.exe 1212 AcroRd32.exe 1212 AcroRd32.exe 1212 AcroRd32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
iexplore.exerundll32.exedescription pid process target process PID 1600 wrote to memory of 1508 1600 iexplore.exe IEXPLORE.EXE PID 1600 wrote to memory of 1508 1600 iexplore.exe IEXPLORE.EXE PID 1600 wrote to memory of 1508 1600 iexplore.exe IEXPLORE.EXE PID 1600 wrote to memory of 1508 1600 iexplore.exe IEXPLORE.EXE PID 2028 wrote to memory of 1916 2028 rundll32.exe AcroRd32.exe PID 2028 wrote to memory of 1916 2028 rundll32.exe AcroRd32.exe PID 2028 wrote to memory of 1916 2028 rundll32.exe AcroRd32.exe PID 2028 wrote to memory of 1916 2028 rundll32.exe AcroRd32.exe
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\HRCComplaintProcedureForm (7).doc"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Documents\DisconnectFind\" -ad -an -ai#7zMap4898:90:7zEvent304101⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\vcredist2010_x64.log.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Documents\BlockWatch\" -ad -an -ai#7zMap16830:82:7zEvent303691⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Workflow.VisualBasic.Targets1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Workflow.VisualBasic.Targets"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Workflow.Targets"1⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JACOLRK2.txt
-
memory/1348-0-0x000007FEF50D0000-0x000007FEF534A000-memory.dmpFilesize
2.5MB
-
memory/1508-1-0x0000000000000000-mapping.dmp
-
memory/1916-6-0x0000000000000000-mapping.dmp