Analysis

  • max time kernel
    1770s
  • max time network
    1834s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-09-2021 01:25

General

  • Target

    diretto_09.21.doc

  • Size

    131KB

  • MD5

    b00b548fde0aed1436f7ec6f9a87b007

  • SHA1

    6a54bc7bc4f8a7c6747e26733482bda28d8e3054

  • SHA256

    8d9a5a1713cf71f93f7a79045d329f690233df1273e2eba1e9f0dc6dae28411a

  • SHA512

    3003ec06428c49459a79f6a78322ff3d10a5cab499ed1897a78ebdf052b1bd289518c8d89c21e2171cfeec6c46203cdfbe63aef444f34522124647f38cba0aa6

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • BazarBackdoor

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Bazar/Team9 Backdoor payload 3 IoCs
  • Bazar/Team9 Loader payload 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\diretto_09.21.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\aprilAccessWindows...hTa"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" c:\users\public\aprilAccessWindows.jpg
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:624
        • C:\Windows\system32\regsvr32.exe
          c:\users\public\aprilAccessWindows.jpg
          4⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:364
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k UnistackSvcGroup
            5⤵
              PID:856
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:344
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe c:\users\public\aprilAccessWindows.jpg,DllRegisterServer {424F959A-755E-43BB-9E3A-61B3EF5A8E04}
        1⤵
        • Loads dropped DLL
        PID:1636

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

        MD5

        260a5e922dbd2b867410e427b67c2593

        SHA1

        e15b06c27dc33d96a2d21ea1fcdadd82c3abe936

        SHA256

        3dffc6cb5ef9e3c9ff8cebadd4f2924bc535e3799cc5ac5abb0ce4992d916784

        SHA512

        cc574cfe175c66375b336c9bffae6813ce6623f8cf5951683f544bca44ab178be0fab4a3f42a18dad735dcc6fe28ff00d8026f95a79b99df3d1b4289e1f275ff

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_EB89DAABC506211953B39386306B9944

        MD5

        821c9872c8510fdbd842039d069667ad

        SHA1

        d56d48793b147c9498aec6d81fa68627880aa685

        SHA256

        a20dc12f1e7098e5467abfd4a4b4afcf41463ba84e1547ffa12d7720766664d0

        SHA512

        d34b914475e1de44cf733b664c594248977b5c061604c1d946972313883cfe5947c4f503643691f33495c3de5086dd88c599a2260278c04d36ff44b8e9d1933d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        MD5

        ab5c36d10261c173c5896f3478cdc6b7

        SHA1

        87ac53810ad125663519e944bc87ded3979cbee4

        SHA256

        f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9

        SHA512

        e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

        MD5

        de27664da1e04c94901fcc3880064613

        SHA1

        aeb52fc87f907dd40ae683c52cf3129d4b27e25a

        SHA256

        7e59ce8a2d7d1e1201e535a3175bfaf239b9f5da7be265c18c5ff1e1bc696282

        SHA512

        2d1e23a6cb1641bb1c393e404950a781cb20e5123c1e85bed129a02cc54b45e84ef49b54bd4a19a0dd48c66693fe119fd4f6b6733c71d34655d4ef67b760fa36

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB

        MD5

        9e60fab6de64c98a6e001e3c3a5850d1

        SHA1

        9c96f7029f2177a07e1f4e9bc415a68b72a2a2e3

        SHA256

        90b34e682450d227362b77ed98ffa50b07cc26219b2ff406d066456cd0e9b558

        SHA512

        060eb8df284ccc4886df7d46e1fc89d526d3f860e1647539b9b3aeed45bb2deb1f4341bf4dc466026c10b60df9c1f5f75ac983dad5e751f9d592bb4309f91b13

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

        MD5

        601619fff2ff60dbac9f9c75e8b6a6d8

        SHA1

        cd2cee1a02cdac4592a393ef59c8897f4cc4e213

        SHA256

        4bf44fdb87ddc40e002f994124ab79d373c55ded26b06455d582c028154dd3ca

        SHA512

        63940d07f8503ee8a4478e5ee32d1deee36803c6f2d7b3b0ddfdcf2dd614619bf0dbde165eb795e93550820093ccc2cc426fa3f8deee31ba9e7e161bb41d69bf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_EB89DAABC506211953B39386306B9944

        MD5

        eeec00571e1be51318957b450824584b

        SHA1

        a6d6d5409235c9a373d0fd1adaf349129a43177c

        SHA256

        7292cb04a9c392f7bdcda18d56a5c16b6533799e09e59fbabae3dc6c2c55194d

        SHA512

        4daddea3be8c501762d1f1e48ae596400302fb4c61792fffc8eef7a5146a2f8664041968a065eddfe6d147e1a1807cba62a96d6c59c0c1c00998e6f3693ea4b9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        MD5

        f74a710f3815cf2c94594e5f5983cd91

        SHA1

        7b06fdecc2c8556eb3a167a9afc5269a30fe9306

        SHA256

        a70ab1aeb4ae4da05c3684de00ce420ff0e0cd383139eaf66705d03ccf3ca4c0

        SHA512

        8d6c5fc2b918d484e174b9349e3f03b1594663915e5e88e921f6deec22874af06fb3058580563485401fafe69d7c94ba61780bf3a7990399f9adba0c4108eb24

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

        MD5

        64c5e3c1847181e781e6c5fdd2b60d77

        SHA1

        5daeaba04612a24b2ba0e7aec45e5932423d42c1

        SHA256

        5c32705c99e77015a112c13260883a826e2275db915eceaf34e0ed8a5c37181a

        SHA512

        3b6b6a83c166b15cc356e243cedd596b5fcfb9f0b88e318755eb5fc28d21c5ae45e81d830624979c683982b61cf62f4b9fba688c757f7c73e111fa98b125cfed

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB

        MD5

        305d5cf11f625b3237683e78fcd50e3c

        SHA1

        d141cf156138cdf210e66832858fc63f25694bb8

        SHA256

        c519e572b9fb2fd759d4f18a98d8f0bf7c008d805692b036331191c26ed529bb

        SHA512

        5fa8ba503751c73853196ee696b9642092fb7c8c4d299b1191feff06e0f8cede38ff31d529ba97e33f4cff63f115ec2d611fac5a3499551d3035676929ff5ba3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

        MD5

        2e12fa14a37bed14a959548f16481b95

        SHA1

        bf34cd24f9a6ae67efaa9a97375001a74176f221

        SHA256

        1fd09c461343463a2f993568fa5e77be6e053f1a36e9a311edfa3b3c0109c3f2

        SHA512

        b8b0afcc648ab52f000e0826b859a05ec76df84d9f32dbbdaeb017875eaefe9aa726c0f1784676928e28f9253f22a3b27850b254c1e2240364f010f427c80c4b

      • C:\Users\Admin\AppData\Local\Temp\aprilAccessWindows...hTa

        MD5

        a7297781b5aecf4513d5a7a866e6281a

        SHA1

        a2c2d1365a122bd28b23426db3807ca712bc354a

        SHA256

        96d5aaa8342c344fdae21fe8fc414bed055f075435129e9e81d77667be7bb946

        SHA512

        09b297ecf0dbc561d3e8b249ce3bfacb1a17000e507caf116778656b665262a8144a2190f844c087f7e4ce357f656888c5e6867650739ebcd51b91330a6248d2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\46W60EGD.txt

        MD5

        507975c33eec41c7777d644e3a097153

        SHA1

        6830d0896b86bde0bc4d75c67277615fc8dbf551

        SHA256

        384366d994c557b9b9e55658455c930c19c5341655e8d6bf1848dce166b9f651

        SHA512

        fa04ed7188f927e44cf06d666ae4d9802f917e9ea66a2c6bddd4facf1e4db237a41120ffb09234376610ad01edd459ab02d8b9090902c59dae5c731fcd41e8b8

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QUOIXS6Q.txt

        MD5

        7c987833d92185b42e3d83b8117dbfad

        SHA1

        d266cfa7c29e590a72c8b14a86ddac6257f3c320

        SHA256

        f04bcb75ca9c7d83b3f9f47316fdeeb88700a89f9edcb14c82cb4128e43a890d

        SHA512

        eacd23d55bd0a7e6c7d6a93f3d952976b5b20992fe9ef0d21c762b585facacbcbdeddccc622c1f44f621ea9d7756301daec015ffc493215f699a7a0bcc70a449

      • \??\c:\users\public\aprilAccessWindows.jpg

        MD5

        058c950aad3909ca42b3d861e2b1ae9b

        SHA1

        dec80280e0f634b8c23135059e2ffa1b3e485aa9

        SHA256

        07d09cefb82af6be9e5eab889eb671198ecdc3aa952e50e306ebfdde6bdb80c5

        SHA512

        562e665763d3bc864998e0ba9f19aad09f6f3da10c7bcebfbe2aabb5c483a439c12db91c0dec8a95b390a4254cea41dde45dcfdf9969e0ec585911f4d255090a

      • \Users\Public\aprilAccessWindows.jpg

        MD5

        058c950aad3909ca42b3d861e2b1ae9b

        SHA1

        dec80280e0f634b8c23135059e2ffa1b3e485aa9

        SHA256

        07d09cefb82af6be9e5eab889eb671198ecdc3aa952e50e306ebfdde6bdb80c5

        SHA512

        562e665763d3bc864998e0ba9f19aad09f6f3da10c7bcebfbe2aabb5c483a439c12db91c0dec8a95b390a4254cea41dde45dcfdf9969e0ec585911f4d255090a

      • \Users\Public\aprilAccessWindows.jpg

        MD5

        058c950aad3909ca42b3d861e2b1ae9b

        SHA1

        dec80280e0f634b8c23135059e2ffa1b3e485aa9

        SHA256

        07d09cefb82af6be9e5eab889eb671198ecdc3aa952e50e306ebfdde6bdb80c5

        SHA512

        562e665763d3bc864998e0ba9f19aad09f6f3da10c7bcebfbe2aabb5c483a439c12db91c0dec8a95b390a4254cea41dde45dcfdf9969e0ec585911f4d255090a

      • \Users\Public\aprilAccessWindows.jpg

        MD5

        058c950aad3909ca42b3d861e2b1ae9b

        SHA1

        dec80280e0f634b8c23135059e2ffa1b3e485aa9

        SHA256

        07d09cefb82af6be9e5eab889eb671198ecdc3aa952e50e306ebfdde6bdb80c5

        SHA512

        562e665763d3bc864998e0ba9f19aad09f6f3da10c7bcebfbe2aabb5c483a439c12db91c0dec8a95b390a4254cea41dde45dcfdf9969e0ec585911f4d255090a

      • memory/344-73-0x0000000000000000-mapping.dmp

      • memory/364-74-0x0000000001CE0000-0x0000000001CF7000-memory.dmp

        Filesize

        92KB

      • memory/364-70-0x0000000000000000-mapping.dmp

      • memory/364-71-0x000007FEFBAE1000-0x000007FEFBAE3000-memory.dmp

        Filesize

        8KB

      • memory/624-66-0x0000000000000000-mapping.dmp

      • memory/856-80-0x00000000FF0E0000-0x00000000FF12D000-memory.dmp

        Filesize

        308KB

      • memory/856-78-0x00000000FF0E0000-0x00000000FF12D000-memory.dmp

        Filesize

        308KB

      • memory/856-79-0x00000000FF1066F0-mapping.dmp

      • memory/1016-77-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1016-60-0x0000000072441000-0x0000000072444000-memory.dmp

        Filesize

        12KB

      • memory/1016-63-0x0000000075211000-0x0000000075213000-memory.dmp

        Filesize

        8KB

      • memory/1016-62-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1016-61-0x000000006FEC1000-0x000000006FEC3000-memory.dmp

        Filesize

        8KB

      • memory/1636-76-0x00000000001B0000-0x00000000001C7000-memory.dmp

        Filesize

        92KB

      • memory/1664-64-0x0000000000000000-mapping.dmp