Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    06-03-2021 09:30

General

  • Target

    INV-1581.doc

  • Size

    149KB

  • MD5

    470b5f77bd00e2002939833ab72ad47a

  • SHA1

    540fb80aae64faccbb47ced4d4ec57448ca4297e

  • SHA256

    7df11aa42a30d550a3fba77ed9fc353108f4cac53a2dac6f29a6534dd0ecbd06

  • SHA512

    69a569c079bf78693d751d3834f94888de5f3276b69d9eb63c09bec678335dbb0740337d87646ea26325851d2e4754c881d7c7512520d5831468bc07a84f6b55

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\INV-1581.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe C:\Users\Admin\AppData\Local\Temp\healthother.vbs
      2⤵
      • Process spawned unexpected child process
      PID:2044
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe C:\Users\Admin\AppData\Local\Temp\agoright.exe
      2⤵
      • Process spawned unexpected child process
      PID:268
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\healthother.vbs"
      2⤵
      • Blocklisted process makes network request
      PID:1768
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:368

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\agoright.exe
    MD5

    62962daa1b19bbcc2db10b7bfd531ea6

    SHA1

    d64bae91091eda6a7532ebec06aa70893b79e1f8

    SHA256

    80c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880

    SHA512

    9002a0475fdb38541e78048709006926655c726e93e823b84e2dbf5b53fd539a5342e7266447d23db0e5528e27a19961b115b180c94f2272ff124c7e5c8304e7

  • C:\Users\Admin\AppData\Local\Temp\healthother.vbs
    MD5

    552f3e780bb97a3f81a732d5e26e2474

    SHA1

    bfddf68ec2daf167f212a0157b258ead3827ca47

    SHA256

    c711528dad5f1237a870ac01a6657579ac276dd30b0904aa0d4bcb795678d2ab

    SHA512

    1fe1db760854d0182c20d80ae98a19679aee1760a508ddbc31eb3b9081f4d105259028dfcd14d08d7d3bfba2670685d896aa642cd630947fd58dd66b417da2a0

  • memory/268-15-0x000000006B0E1000-0x000000006B0E3000-memory.dmp
    Filesize

    8KB

  • memory/268-13-0x0000000000000000-mapping.dmp
  • memory/368-18-0x0000000002300000-0x0000000002301000-memory.dmp
    Filesize

    4KB

  • memory/892-3-0x000000006FEB1000-0x000000006FEB3000-memory.dmp
    Filesize

    8KB

  • memory/892-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/892-2-0x0000000072431000-0x0000000072434000-memory.dmp
    Filesize

    12KB

  • memory/1096-11-0x000007FEF7570000-0x000007FEF77EA000-memory.dmp
    Filesize

    2.5MB

  • memory/1768-12-0x00000000025E0000-0x00000000025E4000-memory.dmp
    Filesize

    16KB

  • memory/1768-10-0x0000000000000000-mapping.dmp
  • memory/1984-8-0x000007FEFB931000-0x000007FEFB933000-memory.dmp
    Filesize

    8KB

  • memory/2044-7-0x000000006B251000-0x000000006B253000-memory.dmp
    Filesize

    8KB

  • memory/2044-6-0x0000000074D91000-0x0000000074D93000-memory.dmp
    Filesize

    8KB

  • memory/2044-5-0x0000000000000000-mapping.dmp