Analysis

  • max time kernel
    106s
  • max time network
    14s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    06-05-2021 12:32

General

  • Target

    8fb8f5687af81aaec01a26a0875ee8ce3915a9f7efd354c80ea8f7686aa913ae.bin.doc

  • Size

    75KB

  • MD5

    66f514b9b216db3250f012599f4da6df

  • SHA1

    991602aa8cf1c393b19997d6eb7becd126d432d1

  • SHA256

    8fb8f5687af81aaec01a26a0875ee8ce3915a9f7efd354c80ea8f7686aa913ae

  • SHA512

    fb3667c4edf47a46a596035f1577fb75c415c018b670ea14c7c21518cb938d95a08d996719f43ad096f35b0374decb6157fff9025a0a7a6c2a79e77ed84714ba

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8fb8f5687af81aaec01a26a0875ee8ce3915a9f7efd354c80ea8f7686aa913ae.bin.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1496
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 c:\programdata\rightGeneric.jpg,PluginInit
        2⤵
        • Process spawned unexpected child process
        PID:1164

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\MSO1033.acl
      MD5

      4b5360ed4dfc214db342f29cd53ac6c2

      SHA1

      8c109aadd38cc079321fb1c6b8beadb2b1bcfd3e

      SHA256

      911e9d64cd1d6fe4b636c9e727c176c0b1dea08e3f9e3be83d8bb7d1884d8b36

      SHA512

      29391452e82f815823175459328484391a35dda66a350dd44a306f6c247612fb081785cbaba2a9906bb813f57cca78ec6f6325bf9cc92ec4ed57ba520b853e5e

    • \??\c:\programdata\rightGeneric.jpg
      MD5

      92a79c5522380b2d92dcea798df2ec18

      SHA1

      c1361ad8175cdcc8eb4526a5a0832d8661df2a23

      SHA256

      c58345ee3a85e0808f27f14b20940f9ceaf750315831cabe02f71c3abc9786a9

      SHA512

      a4d86284d671e35f9b8bb8b685497373a64449341e392bfa156f1a4ef54807af709c6b6310987b125bea45292f1967cb8d426c0d5d552ac9d27c992e8e08c032

    • memory/768-60-0x0000000072C81000-0x0000000072C84000-memory.dmp
      Filesize

      12KB

    • memory/768-61-0x0000000070701000-0x0000000070703000-memory.dmp
      Filesize

      8KB

    • memory/768-62-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/768-63-0x0000000005BF0000-0x000000000683A000-memory.dmp
      Filesize

      12.3MB

    • memory/1164-68-0x0000000000000000-mapping.dmp
    • memory/1164-69-0x0000000075EF1000-0x0000000075EF3000-memory.dmp
      Filesize

      8KB

    • memory/1232-71-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1496-72-0x0000000000000000-mapping.dmp
    • memory/1496-73-0x000007FEFC181000-0x000007FEFC183000-memory.dmp
      Filesize

      8KB