Analysis

  • max time kernel
    65s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    06-05-2021 12:49

General

  • Target

    files_05.21.doc

  • Size

    75KB

  • MD5

    f143869b5567d92152addee5f40b2544

  • SHA1

    641ba7fc05997aca01b83dfbaa078c86d4b6b7df

  • SHA256

    9e7906cf5f653a70e1a30828d805dcf165b50a7e664cb94de562771203219e21

  • SHA512

    655f4d350a12b39aadbdf7eae54c2e7f39bdd751bede45c28c044f207aef5e4e80abe3031b069331e76a28b2ae1e29438b4fe13815832bd9e25f6484bb1a62fd

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\files_05.21.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1384
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 c:\programdata\storageArgument.jpg,PluginInit
        2⤵
        • Process spawned unexpected child process
        PID:360

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\MSO1033.acl
      MD5

      9c46632e61bccb1406c2812e4c923e0c

      SHA1

      7007d17afef0b74a3372652672929ab9ae0c5323

      SHA256

      b9c0af7a1dfa5a205daf67b1835d1dcfef7b00653d7424f25ed26d8b476d3828

      SHA512

      73716fd2bbb0a9dbe69630881cd10a43ba7736f76501cab3da613a4200b0ada7928dbec6ce691d9b01043cf8c9ad7e71b42a2c2a2fa550357351ac426664b163

    • \??\c:\programdata\storageArgument.jpg
      MD5

      d9fea499cf43ca9d1b3c30aa11c36b32

      SHA1

      2029ac0cf93300b10cee62f02c2f0efa41a6d451

      SHA256

      77c624edd299f5d5c87c5d88f4c7c954edc4bed3ab5d1a2d315b318ba9eab8a6

      SHA512

      2d9b2676582bf5ab24620fe71320a659e574ac9add3dc2b00cfad856dd425b669cc457908fa35bb8d2d3031e459b7ff4965083cb29e2a2325f381422b1fd8ca9

    • memory/360-67-0x0000000000000000-mapping.dmp
    • memory/360-68-0x0000000075D41000-0x0000000075D43000-memory.dmp
      Filesize

      8KB

    • memory/1384-71-0x0000000000000000-mapping.dmp
    • memory/1384-72-0x000007FEFB931000-0x000007FEFB933000-memory.dmp
      Filesize

      8KB

    • memory/1852-70-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2016-59-0x0000000072291000-0x0000000072294000-memory.dmp
      Filesize

      12KB

    • memory/2016-60-0x000000006FD11000-0x000000006FD13000-memory.dmp
      Filesize

      8KB

    • memory/2016-61-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2016-66-0x0000000005D20000-0x000000000696A000-memory.dmp
      Filesize

      12.3MB