Resubmissions

23-10-2021 12:33

211023-prhqbadcdj 10

23-10-2021 10:17

211023-mbpsksdcak 10

Analysis

  • max time kernel
    300s
  • max time network
    303s
  • platform
    windows7_x64
  • resource
    win7-ja-20210920
  • submitted
    23-10-2021 12:33

General

  • Target

    adjure.010.21.21.doc

  • Size

    34KB

  • MD5

    4f2dda35a63d6c4d724019d36195a4f9

  • SHA1

    83222019ce517eaa50641763b755f449023b756e

  • SHA256

    7d8378bb87f881c44968a65568fb5165de3ae90afe59a67ef25c5f6af694787d

  • SHA512

    fc01d362ef1b5825cf78aca1c276a1b3e5246ee4464233c78462afabe72b68c299d73b3c5a2363fa6ae08e26265573e63eb0d5f4ff874f086faf40988b9ca2a7

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\adjure.010.21.21.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\users\public\seaYouCaroline.hta"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      PID:1040
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2020

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\users\public\seaYouCaroline.hta
      MD5

      836cfe47fac47e317b075e1221957676

      SHA1

      5f55dd4c8572c8c5e52bafca8c89e1ad0d97e11f

      SHA256

      ae195755cd0ed8279ea7f7666a420fa45afb4863839999a3f541264213ffa175

      SHA512

      cf99e94fe171e8ee9df723b68105e197c79999eaa9dfde1a2bb7d456473c8ef2637f6b05495b9ad021bc60d5abd561794fd13833ed6e1e48e90307376c5b0585

    • memory/108-54-0x0000000072D71000-0x0000000072D74000-memory.dmp
      Filesize

      12KB

    • memory/108-55-0x00000000707F1000-0x00000000707F3000-memory.dmp
      Filesize

      8KB

    • memory/108-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/108-57-0x0000000076481000-0x0000000076483000-memory.dmp
      Filesize

      8KB

    • memory/1040-58-0x0000000000000000-mapping.dmp
    • memory/2020-60-0x0000000000000000-mapping.dmp
    • memory/2020-61-0x000007FEFC281000-0x000007FEFC283000-memory.dmp
      Filesize

      8KB