Analysis

  • max time kernel
    134s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-04-2022 04:39

General

  • Target

    42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b.doc

  • Size

    577KB

  • MD5

    66f4f1384105ce7ee1636d34f2afb1c9

  • SHA1

    3f23d152cc7badf728dfd60f6baa5c861a500630

  • SHA256

    42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b

  • SHA512

    d854b736f4f5e21db59b784e18e08e6047c601946b80da26fea019ef3725ee8cf85f99fecfd05dc70dac295e38a55609593ce7ad9a16332713c6d0257f922368

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1156
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c certutil -decode C:\Users\Admin\AppData\Local\Temp\\Signature.crt C:\Users\Admin\AppData\Local\Temp\\Sign.exe
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Windows\SysWOW64\certutil.exe
          certutil -decode C:\Users\Admin\AppData\Local\Temp\\Signature.crt C:\Users\Admin\AppData\Local\Temp\\Sign.exe
          3⤵
            PID:676
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\\Sign.exe
          2⤵
          • Process spawned unexpected child process
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:324
          • C:\Users\Admin\AppData\Local\Temp\Sign.exe
            C:\Users\Admin\AppData\Local\Temp\\Sign.exe
            3⤵
            • Executes dropped EXE
            PID:592
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {2F7C3748-8C89-4EFF-AE8D-E16749A5516D} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:384
        • C:\ProgramData\Adobe\Acrobat\Adobe-x86-ui.exe
          C:\ProgramData\Adobe\Acrobat\Adobe-x86-ui.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1112

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Adobe\Acrobat\Adobe-x86-ui.exe

        Filesize

        54KB

        MD5

        4ed42233962a89deaa89fd7b989db081

        SHA1

        cf731ee0af5c19231ff51af589f7434c0367d508

        SHA256

        a96c57c35df18ac20d83b08a88e502071bd0033add0914b951adbd1639b0b873

        SHA512

        78d7dc3a9d38298effa4d9e3c8e829af8cd1b49570df4f0c6e75d2724a9c0f703e06c7ff19d1ebe5d36cfc0e994417b441478b5448864ed3e4196469af6b956d

      • C:\ProgramData\Adobe\Acrobat\Adobe-x86-ui.exe

        Filesize

        54KB

        MD5

        4ed42233962a89deaa89fd7b989db081

        SHA1

        cf731ee0af5c19231ff51af589f7434c0367d508

        SHA256

        a96c57c35df18ac20d83b08a88e502071bd0033add0914b951adbd1639b0b873

        SHA512

        78d7dc3a9d38298effa4d9e3c8e829af8cd1b49570df4f0c6e75d2724a9c0f703e06c7ff19d1ebe5d36cfc0e994417b441478b5448864ed3e4196469af6b956d

      • C:\ProgramData\Adobe\Acrobat\System.Web.Helpers.dll

        Filesize

        135KB

        MD5

        4f13bec852002ea7208deaf82b53f90d

        SHA1

        fffd7f988637d3f79bad6e6fb725f00aa8558044

        SHA256

        6bdd4e1a2887176b20bdc2d710c5d81b68b18e7006a8281f4973e9e31e25f40f

        SHA512

        2216dc754a787bc159e9bc363f8a57ee02caadce16dae41e73ce27cc37d7eef956983bf0dca7c78ef988030d69c4977a067b32667111ca10926a7d684771bf40

      • C:\Users\Admin\AppData\Local\Temp\Sign.exe

        Filesize

        113KB

        MD5

        3cd5fa46507657f723719b7809d2d1f9

        SHA1

        34ddc14b9a04eba98c3aa1cb27033e12ec847e03

        SHA256

        a6dbc36c472b3ba70a98efd0db35e75c340086be15d3c3ab4e39033604d0bcf9

        SHA512

        c589f7628f5ac5db570564abd65a26d6b67467b3064abc08a9e352eeda8bc2e28ea7d1c02e15a145d77ec3aae7ecc1890a999df8bbdf0645c05ccfb41acd2442

      • C:\Users\Admin\AppData\Local\Temp\Sign.exe

        Filesize

        113KB

        MD5

        3cd5fa46507657f723719b7809d2d1f9

        SHA1

        34ddc14b9a04eba98c3aa1cb27033e12ec847e03

        SHA256

        a6dbc36c472b3ba70a98efd0db35e75c340086be15d3c3ab4e39033604d0bcf9

        SHA512

        c589f7628f5ac5db570564abd65a26d6b67467b3064abc08a9e352eeda8bc2e28ea7d1c02e15a145d77ec3aae7ecc1890a999df8bbdf0645c05ccfb41acd2442

      • C:\Users\Admin\AppData\Local\Temp\Signature.crt

        Filesize

        301KB

        MD5

        5e152c07eeecd3ac87ab006512995335

        SHA1

        2d6e81becabd69ef59b15daf63616011ace87540

        SHA256

        f2de986d091c3d27fb083ab124cdd437275afc287da1aa83a62f391f3f6b56f7

        SHA512

        2deb4c5ea8dbf5e77b0c2d3af3e75d985f585ea435a5da9ce83ad710e44c81f424027de09c13c207d8cd0a6e3467e474f1df360efd11245b1207d796a618cb9c

      • \Users\Admin\AppData\Local\Temp\Sign.exe

        Filesize

        113KB

        MD5

        3cd5fa46507657f723719b7809d2d1f9

        SHA1

        34ddc14b9a04eba98c3aa1cb27033e12ec847e03

        SHA256

        a6dbc36c472b3ba70a98efd0db35e75c340086be15d3c3ab4e39033604d0bcf9

        SHA512

        c589f7628f5ac5db570564abd65a26d6b67467b3064abc08a9e352eeda8bc2e28ea7d1c02e15a145d77ec3aae7ecc1890a999df8bbdf0645c05ccfb41acd2442

      • memory/592-78-0x0000000000280000-0x00000000002A6000-memory.dmp

        Filesize

        152KB

      • memory/592-79-0x00000000002B0000-0x00000000002C0000-memory.dmp

        Filesize

        64KB

      • memory/592-77-0x000000001B0F0000-0x000000001B0F2000-memory.dmp

        Filesize

        8KB

      • memory/592-76-0x00000000003B0000-0x00000000003D2000-memory.dmp

        Filesize

        136KB

      • memory/1112-86-0x000000001AFB0000-0x000000001AFB2000-memory.dmp

        Filesize

        8KB

      • memory/1112-85-0x00000000004F0000-0x0000000000516000-memory.dmp

        Filesize

        152KB

      • memory/1112-83-0x0000000000F70000-0x0000000000F84000-memory.dmp

        Filesize

        80KB

      • memory/1156-60-0x000007FEFC021000-0x000007FEFC023000-memory.dmp

        Filesize

        8KB

      • memory/1964-57-0x0000000075401000-0x0000000075403000-memory.dmp

        Filesize

        8KB

      • memory/1964-65-0x00000000003D5000-0x00000000003D9000-memory.dmp

        Filesize

        16KB

      • memory/1964-54-0x0000000072B11000-0x0000000072B14000-memory.dmp

        Filesize

        12KB

      • memory/1964-63-0x00000000003D5000-0x00000000003D9000-memory.dmp

        Filesize

        16KB

      • memory/1964-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1964-61-0x00000000003D5000-0x00000000003D9000-memory.dmp

        Filesize

        16KB

      • memory/1964-55-0x0000000070591000-0x0000000070593000-memory.dmp

        Filesize

        8KB

      • memory/1964-62-0x00000000003D5000-0x00000000003D9000-memory.dmp

        Filesize

        16KB

      • memory/1964-59-0x000000007157D000-0x0000000071588000-memory.dmp

        Filesize

        44KB

      • memory/1964-87-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB