Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    21-10-2021 15:40

General

  • Target

    direct 010.21.doc

  • Size

    34KB

  • MD5

    cbfc543998fd4a558517ae61338c48f3

  • SHA1

    779894322ce9ce5fded2aca4ad8717f8aea63ea3

  • SHA256

    0b5450047f5d2d2a2710902083aba25bd1999e9378fab3e885a90586c8f274e9

  • SHA512

    bf0a8a2cc66c4ba467b598bd97f5d4c110443757b6541e4773f07ace795005a5abc517c0ddeb6d99976e1a800181d7bf5ac327e2ad0315542b7845bcb44898f6

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\direct 010.21.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\users\public\redCaroline.hta"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" c:\users\public\kingCaroline.jpg
        3⤵
          PID:1664
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1844

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\users\public\redCaroline.hta
        MD5

        57425688ce24cb6a11e916c881c6b98a

        SHA1

        6c9ee880af48620a12f5a6e289bceb799121d79a

        SHA256

        ada29317ab1852485d22e6dd89b4623f10625c78937d4b360e9bdef3d1d099f5

        SHA512

        17e64381274361bd421b4f7e700d69b8cf07fb0bc8e877aa9621661eb562f1e8f6aef1d2d6d0fb1ae494a23dddb24d561dc76065cf88ce3a8eda05d630193847

      • \??\c:\users\public\kingCaroline.jpg
        MD5

        5285d7310b08cc1f7eff5ed1ab898972

        SHA1

        3d6f2bd6cfa847ccf5b1329d455a1e63dcbb2b8d

        SHA256

        38dac079572ca83781ce773072dbbfad2169909fd78d5678bcaeb876ab00997f

        SHA512

        d749cc3ec465e38496eb654abb53d44732802416b08398814beb164d740c454a8932c53a335f367d6ead376385a516ed25ae46c8d39641e527c401508eaac1a8

      • memory/828-62-0x00000000006F2000-0x00000000006F6000-memory.dmp
        Filesize

        16KB

      • memory/828-65-0x00000000006F2000-0x00000000006F6000-memory.dmp
        Filesize

        16KB

      • memory/828-58-0x00000000006F2000-0x00000000006F6000-memory.dmp
        Filesize

        16KB

      • memory/828-59-0x00000000006F2000-0x00000000006F6000-memory.dmp
        Filesize

        16KB

      • memory/828-60-0x00000000006F2000-0x00000000006F6000-memory.dmp
        Filesize

        16KB

      • memory/828-63-0x00000000006F2000-0x00000000006F6000-memory.dmp
        Filesize

        16KB

      • memory/828-54-0x0000000072181000-0x0000000072184000-memory.dmp
        Filesize

        12KB

      • memory/828-57-0x0000000075FA1000-0x0000000075FA3000-memory.dmp
        Filesize

        8KB

      • memory/828-74-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/828-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/828-55-0x000000006FC01000-0x000000006FC03000-memory.dmp
        Filesize

        8KB

      • memory/1496-66-0x0000000000000000-mapping.dmp
      • memory/1664-70-0x0000000000000000-mapping.dmp
      • memory/1664-73-0x00000000001B0000-0x00000000001B1000-memory.dmp
        Filesize

        4KB

      • memory/1844-69-0x000007FEFB691000-0x000007FEFB693000-memory.dmp
        Filesize

        8KB

      • memory/1844-68-0x0000000000000000-mapping.dmp