Analysis
-
max time kernel
1770s -
max time network
1834s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
30-09-2021 01:25
Static task
static1
Behavioral task
behavioral1
Sample
diretto_09.21.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
diretto_09.21.doc
Resource
win10-en-20210920
General
-
Target
diretto_09.21.doc
-
Size
131KB
-
MD5
b00b548fde0aed1436f7ec6f9a87b007
-
SHA1
6a54bc7bc4f8a7c6747e26733482bda28d8e3054
-
SHA256
8d9a5a1713cf71f93f7a79045d329f690233df1273e2eba1e9f0dc6dae28411a
-
SHA512
3003ec06428c49459a79f6a78322ff3d10a5cab499ed1897a78ebdf052b1bd289518c8d89c21e2171cfeec6c46203cdfbe63aef444f34522124647f38cba0aa6
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
mshta.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1664 1016 mshta.exe WINWORD.EXE -
Bazar/Team9 Backdoor payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/856-79-0x00000000FF1066F0-mapping.dmp BazarBackdoorVar4 behavioral1/memory/856-78-0x00000000FF0E0000-0x00000000FF12D000-memory.dmp BazarBackdoorVar4 behavioral1/memory/856-80-0x00000000FF0E0000-0x00000000FF12D000-memory.dmp BazarBackdoorVar4 -
Bazar/Team9 Loader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/364-74-0x0000000001CE0000-0x0000000001CF7000-memory.dmp BazarLoaderVar6 behavioral1/memory/1636-76-0x00000000001B0000-0x00000000001C7000-memory.dmp BazarLoaderVar6 -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 6 1664 mshta.exe -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
Processes:
regsvr32.exeregsvr32.exerundll32.exepid process 624 regsvr32.exe 364 regsvr32.exe 1636 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 364 set thread context of 856 364 regsvr32.exe svchost.exe -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEmshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1016 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
regsvr32.exepid process 364 regsvr32.exe 364 regsvr32.exe 364 regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1016 WINWORD.EXE 1016 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
WINWORD.EXEmshta.exeregsvr32.exeregsvr32.exedescription pid process target process PID 1016 wrote to memory of 1664 1016 WINWORD.EXE mshta.exe PID 1016 wrote to memory of 1664 1016 WINWORD.EXE mshta.exe PID 1016 wrote to memory of 1664 1016 WINWORD.EXE mshta.exe PID 1016 wrote to memory of 1664 1016 WINWORD.EXE mshta.exe PID 1664 wrote to memory of 624 1664 mshta.exe regsvr32.exe PID 1664 wrote to memory of 624 1664 mshta.exe regsvr32.exe PID 1664 wrote to memory of 624 1664 mshta.exe regsvr32.exe PID 1664 wrote to memory of 624 1664 mshta.exe regsvr32.exe PID 1664 wrote to memory of 624 1664 mshta.exe regsvr32.exe PID 1664 wrote to memory of 624 1664 mshta.exe regsvr32.exe PID 1664 wrote to memory of 624 1664 mshta.exe regsvr32.exe PID 624 wrote to memory of 364 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 364 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 364 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 364 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 364 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 364 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 364 624 regsvr32.exe regsvr32.exe PID 1016 wrote to memory of 344 1016 WINWORD.EXE splwow64.exe PID 1016 wrote to memory of 344 1016 WINWORD.EXE splwow64.exe PID 1016 wrote to memory of 344 1016 WINWORD.EXE splwow64.exe PID 1016 wrote to memory of 344 1016 WINWORD.EXE splwow64.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe PID 364 wrote to memory of 856 364 regsvr32.exe svchost.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\diretto_09.21.doc"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\aprilAccessWindows...hTa"2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" c:\users\public\aprilAccessWindows.jpg3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\system32\regsvr32.exec:\users\public\aprilAccessWindows.jpg4⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup5⤵PID:856
-
-
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:344
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe c:\users\public\aprilAccessWindows.jpg,DllRegisterServer {424F959A-755E-43BB-9E3A-61B3EF5A8E04}1⤵
- Loads dropped DLL
PID:1636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
MD5260a5e922dbd2b867410e427b67c2593
SHA1e15b06c27dc33d96a2d21ea1fcdadd82c3abe936
SHA2563dffc6cb5ef9e3c9ff8cebadd4f2924bc535e3799cc5ac5abb0ce4992d916784
SHA512cc574cfe175c66375b336c9bffae6813ce6623f8cf5951683f544bca44ab178be0fab4a3f42a18dad735dcc6fe28ff00d8026f95a79b99df3d1b4289e1f275ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_EB89DAABC506211953B39386306B9944
MD5821c9872c8510fdbd842039d069667ad
SHA1d56d48793b147c9498aec6d81fa68627880aa685
SHA256a20dc12f1e7098e5467abfd4a4b4afcf41463ba84e1547ffa12d7720766664d0
SHA512d34b914475e1de44cf733b664c594248977b5c061604c1d946972313883cfe5947c4f503643691f33495c3de5086dd88c599a2260278c04d36ff44b8e9d1933d
-
MD5
ab5c36d10261c173c5896f3478cdc6b7
SHA187ac53810ad125663519e944bc87ded3979cbee4
SHA256f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9
SHA512e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
MD5de27664da1e04c94901fcc3880064613
SHA1aeb52fc87f907dd40ae683c52cf3129d4b27e25a
SHA2567e59ce8a2d7d1e1201e535a3175bfaf239b9f5da7be265c18c5ff1e1bc696282
SHA5122d1e23a6cb1641bb1c393e404950a781cb20e5123c1e85bed129a02cc54b45e84ef49b54bd4a19a0dd48c66693fe119fd4f6b6733c71d34655d4ef67b760fa36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
MD59e60fab6de64c98a6e001e3c3a5850d1
SHA19c96f7029f2177a07e1f4e9bc415a68b72a2a2e3
SHA25690b34e682450d227362b77ed98ffa50b07cc26219b2ff406d066456cd0e9b558
SHA512060eb8df284ccc4886df7d46e1fc89d526d3f860e1647539b9b3aeed45bb2deb1f4341bf4dc466026c10b60df9c1f5f75ac983dad5e751f9d592bb4309f91b13
-
MD5
a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
MD5601619fff2ff60dbac9f9c75e8b6a6d8
SHA1cd2cee1a02cdac4592a393ef59c8897f4cc4e213
SHA2564bf44fdb87ddc40e002f994124ab79d373c55ded26b06455d582c028154dd3ca
SHA51263940d07f8503ee8a4478e5ee32d1deee36803c6f2d7b3b0ddfdcf2dd614619bf0dbde165eb795e93550820093ccc2cc426fa3f8deee31ba9e7e161bb41d69bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_EB89DAABC506211953B39386306B9944
MD5eeec00571e1be51318957b450824584b
SHA1a6d6d5409235c9a373d0fd1adaf349129a43177c
SHA2567292cb04a9c392f7bdcda18d56a5c16b6533799e09e59fbabae3dc6c2c55194d
SHA5124daddea3be8c501762d1f1e48ae596400302fb4c61792fffc8eef7a5146a2f8664041968a065eddfe6d147e1a1807cba62a96d6c59c0c1c00998e6f3693ea4b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
MD5f74a710f3815cf2c94594e5f5983cd91
SHA17b06fdecc2c8556eb3a167a9afc5269a30fe9306
SHA256a70ab1aeb4ae4da05c3684de00ce420ff0e0cd383139eaf66705d03ccf3ca4c0
SHA5128d6c5fc2b918d484e174b9349e3f03b1594663915e5e88e921f6deec22874af06fb3058580563485401fafe69d7c94ba61780bf3a7990399f9adba0c4108eb24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
MD564c5e3c1847181e781e6c5fdd2b60d77
SHA15daeaba04612a24b2ba0e7aec45e5932423d42c1
SHA2565c32705c99e77015a112c13260883a826e2275db915eceaf34e0ed8a5c37181a
SHA5123b6b6a83c166b15cc356e243cedd596b5fcfb9f0b88e318755eb5fc28d21c5ae45e81d830624979c683982b61cf62f4b9fba688c757f7c73e111fa98b125cfed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
MD5305d5cf11f625b3237683e78fcd50e3c
SHA1d141cf156138cdf210e66832858fc63f25694bb8
SHA256c519e572b9fb2fd759d4f18a98d8f0bf7c008d805692b036331191c26ed529bb
SHA5125fa8ba503751c73853196ee696b9642092fb7c8c4d299b1191feff06e0f8cede38ff31d529ba97e33f4cff63f115ec2d611fac5a3499551d3035676929ff5ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
MD52e12fa14a37bed14a959548f16481b95
SHA1bf34cd24f9a6ae67efaa9a97375001a74176f221
SHA2561fd09c461343463a2f993568fa5e77be6e053f1a36e9a311edfa3b3c0109c3f2
SHA512b8b0afcc648ab52f000e0826b859a05ec76df84d9f32dbbdaeb017875eaefe9aa726c0f1784676928e28f9253f22a3b27850b254c1e2240364f010f427c80c4b
-
MD5
a7297781b5aecf4513d5a7a866e6281a
SHA1a2c2d1365a122bd28b23426db3807ca712bc354a
SHA25696d5aaa8342c344fdae21fe8fc414bed055f075435129e9e81d77667be7bb946
SHA51209b297ecf0dbc561d3e8b249ce3bfacb1a17000e507caf116778656b665262a8144a2190f844c087f7e4ce357f656888c5e6867650739ebcd51b91330a6248d2
-
MD5
507975c33eec41c7777d644e3a097153
SHA16830d0896b86bde0bc4d75c67277615fc8dbf551
SHA256384366d994c557b9b9e55658455c930c19c5341655e8d6bf1848dce166b9f651
SHA512fa04ed7188f927e44cf06d666ae4d9802f917e9ea66a2c6bddd4facf1e4db237a41120ffb09234376610ad01edd459ab02d8b9090902c59dae5c731fcd41e8b8
-
MD5
7c987833d92185b42e3d83b8117dbfad
SHA1d266cfa7c29e590a72c8b14a86ddac6257f3c320
SHA256f04bcb75ca9c7d83b3f9f47316fdeeb88700a89f9edcb14c82cb4128e43a890d
SHA512eacd23d55bd0a7e6c7d6a93f3d952976b5b20992fe9ef0d21c762b585facacbcbdeddccc622c1f44f621ea9d7756301daec015ffc493215f699a7a0bcc70a449
-
MD5
058c950aad3909ca42b3d861e2b1ae9b
SHA1dec80280e0f634b8c23135059e2ffa1b3e485aa9
SHA25607d09cefb82af6be9e5eab889eb671198ecdc3aa952e50e306ebfdde6bdb80c5
SHA512562e665763d3bc864998e0ba9f19aad09f6f3da10c7bcebfbe2aabb5c483a439c12db91c0dec8a95b390a4254cea41dde45dcfdf9969e0ec585911f4d255090a
-
MD5
058c950aad3909ca42b3d861e2b1ae9b
SHA1dec80280e0f634b8c23135059e2ffa1b3e485aa9
SHA25607d09cefb82af6be9e5eab889eb671198ecdc3aa952e50e306ebfdde6bdb80c5
SHA512562e665763d3bc864998e0ba9f19aad09f6f3da10c7bcebfbe2aabb5c483a439c12db91c0dec8a95b390a4254cea41dde45dcfdf9969e0ec585911f4d255090a
-
MD5
058c950aad3909ca42b3d861e2b1ae9b
SHA1dec80280e0f634b8c23135059e2ffa1b3e485aa9
SHA25607d09cefb82af6be9e5eab889eb671198ecdc3aa952e50e306ebfdde6bdb80c5
SHA512562e665763d3bc864998e0ba9f19aad09f6f3da10c7bcebfbe2aabb5c483a439c12db91c0dec8a95b390a4254cea41dde45dcfdf9969e0ec585911f4d255090a
-
MD5
058c950aad3909ca42b3d861e2b1ae9b
SHA1dec80280e0f634b8c23135059e2ffa1b3e485aa9
SHA25607d09cefb82af6be9e5eab889eb671198ecdc3aa952e50e306ebfdde6bdb80c5
SHA512562e665763d3bc864998e0ba9f19aad09f6f3da10c7bcebfbe2aabb5c483a439c12db91c0dec8a95b390a4254cea41dde45dcfdf9969e0ec585911f4d255090a