Analysis

  • max time kernel
    75s
  • max time network
    26s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    29-09-2021 22:48

General

  • Target

    0d8679cdd59a906f58a4e4ec7ef8d673b7360cd9e12d284281a239876fe17c58.doc

  • Size

    132KB

  • MD5

    3229684f95e4e8719676d69a35e17ea8

  • SHA1

    0e94cd2c8cbccd585f167d2381c215cd65c129c1

  • SHA256

    0d8679cdd59a906f58a4e4ec7ef8d673b7360cd9e12d284281a239876fe17c58

  • SHA512

    cf667c33f8fcee9aa93a410634c51730c1db6f917acb452ec5b2e4670cbfdf1a9b8b9aaaf5e0d75763091d7c00f74ca93575a9bc56eeb698de062c14459dfc41

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0d8679cdd59a906f58a4e4ec7ef8d673b7360cd9e12d284281a239876fe17c58.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\popMicrosoft...hTa"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1512
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" c:\users\public\popMicrosoft.jpg
        3⤵
          PID:1104
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1092

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\popMicrosoft...hTa

        MD5

        00bada468a9b50f68d59f751a3ec82ec

        SHA1

        472ab0c1c79fa96cc1b2499cfb7629ce8e79dae0

        SHA256

        a13055962c1b5965c82da9ebc57613ba58c3347041113d1fc0b65d7f223d91a9

        SHA512

        34fe72db4b9a9d4576e7f7540dc05bd4412a8b4735a865d64f9d555617cf869be1680c9ef4c2a06dcb545d17d96139bb874a07d4e1476ff0947871b1bc754d80

      • \??\c:\users\public\popMicrosoft.jpg

        MD5

        9ad6e974287393a4afe4afd3bb084ec2

        SHA1

        5a40ec3b333fe475b8015187cbff75e361f06fdd

        SHA256

        affcfe48491d711e28b171832753aea32fb88970a16e41939eec81f5fb16f0b3

        SHA512

        de245ba450777d0baaf3d608de08ba316bdb7276e52646329980908df435d05d9631d66409306b6bf61578745e622893ccf2d3c366e0f72fd05712ec15fb209a

      • memory/1044-54-0x0000000072031000-0x0000000072034000-memory.dmp

        Filesize

        12KB

      • memory/1044-55-0x000000006FAB1000-0x000000006FAB3000-memory.dmp

        Filesize

        8KB

      • memory/1044-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1044-57-0x0000000075871000-0x0000000075873000-memory.dmp

        Filesize

        8KB

      • memory/1092-65-0x0000000000000000-mapping.dmp

      • memory/1092-66-0x000007FEFB541000-0x000007FEFB543000-memory.dmp

        Filesize

        8KB

      • memory/1104-61-0x0000000000000000-mapping.dmp

      • memory/1104-64-0x00000000002B0000-0x00000000002B1000-memory.dmp

        Filesize

        4KB

      • memory/1512-58-0x0000000000000000-mapping.dmp