Resubmissions
22-03-2021 07:45
210322-73rx4x3g56 10Analysis
-
max time kernel
121s -
max time network
23s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
22-03-2021 07:45
Static task
static1
Behavioral task
behavioral1
Sample
OmeksBlank.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
OmeksBlank.doc
Resource
win10v20201028
General
-
Target
OmeksBlank.doc
-
Size
37KB
-
MD5
51f6b8678de15611bf15e7544dc87c87
-
SHA1
4d04e4490d3bb3590d94bb2dc8038011fadfbec4
-
SHA256
2966d4d96bf053a15a2665464327f3fd5165bd03587679452b1db4f3f03946e9
-
SHA512
fdef0c2194c02d39372f6c3e80ddfb27fa35700cda378af60073c017da30df5b8d8dadb022851edf777c69b84fd4e9a754c1fd823fae5408a3e795f2d2b930b0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
OfficePresentation.exeOfficePresentation.exepid Process 852 OfficePresentation.exe 840 OfficePresentation.exe -
Loads dropped DLL 3 IoCs
Processes:
OfficePresentation.exepid Process 1516 840 OfficePresentation.exe 1200 -
Drops file in Program Files directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc Process File created C:\Program Files\Windows Media Player\OfficePresentation.exe WINWORD.EXE -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Detects Pyinstaller 5 IoCs
Processes:
resource yara_rule behavioral1/files/0x00030000000130ec-7.dat pyinstaller behavioral1/files/0x00030000000130ec-8.dat pyinstaller behavioral1/files/0x00030000000130ec-9.dat pyinstaller behavioral1/files/0x00030000000130ec-11.dat pyinstaller behavioral1/files/0x00030000000130ec-15.dat pyinstaller -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid Process 384 WINWORD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OfficePresentation.exepid Process 840 OfficePresentation.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid Process 384 WINWORD.EXE 384 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
WINWORD.EXEOfficePresentation.exedescription pid Process procid_target PID 384 wrote to memory of 2032 384 WINWORD.EXE 26 PID 384 wrote to memory of 2032 384 WINWORD.EXE 26 PID 384 wrote to memory of 2032 384 WINWORD.EXE 26 PID 384 wrote to memory of 2032 384 WINWORD.EXE 26 PID 852 wrote to memory of 840 852 OfficePresentation.exe 33 PID 852 wrote to memory of 840 852 OfficePresentation.exe 33 PID 852 wrote to memory of 840 852 OfficePresentation.exe 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\OmeksBlank.doc"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2032
-
-
C:\Program Files\Windows Media Player\OfficePresentation.exe"C:/Program Files/Windows Media Player/OfficePresentation.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files\Windows Media Player\OfficePresentation.exe"C:/Program Files/Windows Media Player/OfficePresentation.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
de6717de7bd1daa595c0b00887c25f05
SHA1f70cc94796e6f89499a3958d7fd2001e50a984f0
SHA25695cfd76bfea8839d2c545cc10d1c94131868471d51ccb8a4525058f591f92b44
SHA512eca079d83bd0c0e57e64479dcaf4437c0029a13e1506d117a6f4a139439e4dfacc2b5271822d8b1fc08219bebee9f2c788284290f74aca3d0ac77184e804303b
-
MD5
de6717de7bd1daa595c0b00887c25f05
SHA1f70cc94796e6f89499a3958d7fd2001e50a984f0
SHA25695cfd76bfea8839d2c545cc10d1c94131868471d51ccb8a4525058f591f92b44
SHA512eca079d83bd0c0e57e64479dcaf4437c0029a13e1506d117a6f4a139439e4dfacc2b5271822d8b1fc08219bebee9f2c788284290f74aca3d0ac77184e804303b
-
MD5
de6717de7bd1daa595c0b00887c25f05
SHA1f70cc94796e6f89499a3958d7fd2001e50a984f0
SHA25695cfd76bfea8839d2c545cc10d1c94131868471d51ccb8a4525058f591f92b44
SHA512eca079d83bd0c0e57e64479dcaf4437c0029a13e1506d117a6f4a139439e4dfacc2b5271822d8b1fc08219bebee9f2c788284290f74aca3d0ac77184e804303b
-
MD5
c4b75218b11808db4a04255574b2eb33
SHA1f4a3497fb6972037fb271cfdc5b404a4b28ccf07
SHA25653f27444e1e18cc39bdb733d19111e392769e428b518c0fc0839965b5a5727a2
SHA5120b7ddbe6476cc230c7bdd96b5756dfb85ab769294461d1132f0411502521a2197c0f27c687df88a2cd1ab53332eaa30f17fa65f93dac3f5e56ed2b537232e69c
-
MD5
de6717de7bd1daa595c0b00887c25f05
SHA1f70cc94796e6f89499a3958d7fd2001e50a984f0
SHA25695cfd76bfea8839d2c545cc10d1c94131868471d51ccb8a4525058f591f92b44
SHA512eca079d83bd0c0e57e64479dcaf4437c0029a13e1506d117a6f4a139439e4dfacc2b5271822d8b1fc08219bebee9f2c788284290f74aca3d0ac77184e804303b
-
MD5
de6717de7bd1daa595c0b00887c25f05
SHA1f70cc94796e6f89499a3958d7fd2001e50a984f0
SHA25695cfd76bfea8839d2c545cc10d1c94131868471d51ccb8a4525058f591f92b44
SHA512eca079d83bd0c0e57e64479dcaf4437c0029a13e1506d117a6f4a139439e4dfacc2b5271822d8b1fc08219bebee9f2c788284290f74aca3d0ac77184e804303b
-
MD5
c4b75218b11808db4a04255574b2eb33
SHA1f4a3497fb6972037fb271cfdc5b404a4b28ccf07
SHA25653f27444e1e18cc39bdb733d19111e392769e428b518c0fc0839965b5a5727a2
SHA5120b7ddbe6476cc230c7bdd96b5756dfb85ab769294461d1132f0411502521a2197c0f27c687df88a2cd1ab53332eaa30f17fa65f93dac3f5e56ed2b537232e69c