Analysis

  • max time kernel
    115s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-03-2021 00:50

General

  • Target

    INV-1581.doc

  • Size

    149KB

  • MD5

    470b5f77bd00e2002939833ab72ad47a

  • SHA1

    540fb80aae64faccbb47ced4d4ec57448ca4297e

  • SHA256

    7df11aa42a30d550a3fba77ed9fc353108f4cac53a2dac6f29a6534dd0ecbd06

  • SHA512

    69a569c079bf78693d751d3834f94888de5f3276b69d9eb63c09bec678335dbb0740337d87646ea26325851d2e4754c881d7c7512520d5831468bc07a84f6b55

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\INV-1581.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe C:\Users\Admin\AppData\Local\Temp\healthother.vbs
      2⤵
      • Process spawned unexpected child process
      PID:1980
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe C:\Users\Admin\AppData\Local\Temp\agoright.exe
      2⤵
      • Process spawned unexpected child process
      PID:396
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\healthother.vbs"
      2⤵
      • Blocklisted process makes network request
      PID:1704
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1496

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\agoright.exe
    MD5

    62962daa1b19bbcc2db10b7bfd531ea6

    SHA1

    d64bae91091eda6a7532ebec06aa70893b79e1f8

    SHA256

    80c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880

    SHA512

    9002a0475fdb38541e78048709006926655c726e93e823b84e2dbf5b53fd539a5342e7266447d23db0e5528e27a19961b115b180c94f2272ff124c7e5c8304e7

  • C:\Users\Admin\AppData\Local\Temp\healthother.vbs
    MD5

    552f3e780bb97a3f81a732d5e26e2474

    SHA1

    bfddf68ec2daf167f212a0157b258ead3827ca47

    SHA256

    c711528dad5f1237a870ac01a6657579ac276dd30b0904aa0d4bcb795678d2ab

    SHA512

    1fe1db760854d0182c20d80ae98a19679aee1760a508ddbc31eb3b9081f4d105259028dfcd14d08d7d3bfba2670685d896aa642cd630947fd58dd66b417da2a0

  • memory/396-13-0x0000000000000000-mapping.dmp
  • memory/396-15-0x000000006B131000-0x000000006B133000-memory.dmp
    Filesize

    8KB

  • memory/776-3-0x000000006FF11000-0x000000006FF13000-memory.dmp
    Filesize

    8KB

  • memory/776-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/776-2-0x0000000072491000-0x0000000072494000-memory.dmp
    Filesize

    12KB

  • memory/872-11-0x000007FEF72E0000-0x000007FEF755A000-memory.dmp
    Filesize

    2.5MB

  • memory/1496-18-0x0000000002500000-0x0000000002501000-memory.dmp
    Filesize

    4KB

  • memory/1704-10-0x0000000000000000-mapping.dmp
  • memory/1704-12-0x00000000024C0000-0x00000000024C4000-memory.dmp
    Filesize

    16KB

  • memory/1732-8-0x000007FEFB991000-0x000007FEFB993000-memory.dmp
    Filesize

    8KB

  • memory/1980-7-0x000000006B2A1000-0x000000006B2A3000-memory.dmp
    Filesize

    8KB

  • memory/1980-6-0x0000000075C61000-0x0000000075C63000-memory.dmp
    Filesize

    8KB

  • memory/1980-5-0x0000000000000000-mapping.dmp