Analysis

  • max time kernel
    128s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    15-04-2022 04:39

General

  • Target

    42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b.doc

  • Size

    577KB

  • MD5

    66f4f1384105ce7ee1636d34f2afb1c9

  • SHA1

    3f23d152cc7badf728dfd60f6baa5c861a500630

  • SHA256

    42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b

  • SHA512

    d854b736f4f5e21db59b784e18e08e6047c601946b80da26fea019ef3725ee8cf85f99fecfd05dc70dac295e38a55609593ce7ad9a16332713c6d0257f922368

Score
10/10

Malware Config

Signatures

  • Meta Stealer Stealer

    Meta Stealer steals passwords stored in browsers, written in C++.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c certutil -decode C:\Users\Admin\AppData\Local\Temp\\Signature.crt C:\Users\Admin\AppData\Local\Temp\\Sign.exe
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Windows\system32\certutil.exe
        certutil -decode C:\Users\Admin\AppData\Local\Temp\\Signature.crt C:\Users\Admin\AppData\Local\Temp\\Sign.exe
        3⤵
          PID:1740
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\\Sign.exe
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:328
        • C:\Users\Admin\AppData\Local\Temp\Sign.exe
          C:\Users\Admin\AppData\Local\Temp\\Sign.exe
          3⤵
          • Executes dropped EXE
          PID:4396

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Sign.exe

      Filesize

      113KB

      MD5

      3cd5fa46507657f723719b7809d2d1f9

      SHA1

      34ddc14b9a04eba98c3aa1cb27033e12ec847e03

      SHA256

      a6dbc36c472b3ba70a98efd0db35e75c340086be15d3c3ab4e39033604d0bcf9

      SHA512

      c589f7628f5ac5db570564abd65a26d6b67467b3064abc08a9e352eeda8bc2e28ea7d1c02e15a145d77ec3aae7ecc1890a999df8bbdf0645c05ccfb41acd2442

    • C:\Users\Admin\AppData\Local\Temp\Sign.exe

      Filesize

      113KB

      MD5

      3cd5fa46507657f723719b7809d2d1f9

      SHA1

      34ddc14b9a04eba98c3aa1cb27033e12ec847e03

      SHA256

      a6dbc36c472b3ba70a98efd0db35e75c340086be15d3c3ab4e39033604d0bcf9

      SHA512

      c589f7628f5ac5db570564abd65a26d6b67467b3064abc08a9e352eeda8bc2e28ea7d1c02e15a145d77ec3aae7ecc1890a999df8bbdf0645c05ccfb41acd2442

    • C:\Users\Admin\AppData\Local\Temp\Signature.crt

      Filesize

      301KB

      MD5

      5e152c07eeecd3ac87ab006512995335

      SHA1

      2d6e81becabd69ef59b15daf63616011ace87540

      SHA256

      f2de986d091c3d27fb083ab124cdd437275afc287da1aa83a62f391f3f6b56f7

      SHA512

      2deb4c5ea8dbf5e77b0c2d3af3e75d985f585ea435a5da9ce83ad710e44c81f424027de09c13c207d8cd0a6e3467e474f1df360efd11245b1207d796a618cb9c

    • memory/4396-148-0x00000000007A0000-0x00000000007B0000-memory.dmp

      Filesize

      64KB

    • memory/4396-143-0x00007FF8329B0000-0x00007FF833471000-memory.dmp

      Filesize

      10.8MB

    • memory/4396-144-0x000000001ACE0000-0x000000001ACE2000-memory.dmp

      Filesize

      8KB

    • memory/4396-145-0x0000000002060000-0x0000000002086000-memory.dmp

      Filesize

      152KB

    • memory/4396-147-0x000000001B5C0000-0x000000001BAE8000-memory.dmp

      Filesize

      5.2MB

    • memory/4396-142-0x0000000000010000-0x0000000000032000-memory.dmp

      Filesize

      136KB

    • memory/4396-146-0x000000001AEC0000-0x000000001B082000-memory.dmp

      Filesize

      1.8MB

    • memory/5068-132-0x00007FF81D730000-0x00007FF81D740000-memory.dmp

      Filesize

      64KB

    • memory/5068-134-0x00007FF81D730000-0x00007FF81D740000-memory.dmp

      Filesize

      64KB

    • memory/5068-133-0x00007FF81D730000-0x00007FF81D740000-memory.dmp

      Filesize

      64KB

    • memory/5068-131-0x00007FF81D730000-0x00007FF81D740000-memory.dmp

      Filesize

      64KB

    • memory/5068-130-0x00007FF81D730000-0x00007FF81D740000-memory.dmp

      Filesize

      64KB

    • memory/5068-150-0x00007FF81D730000-0x00007FF81D740000-memory.dmp

      Filesize

      64KB

    • memory/5068-149-0x00007FF81D730000-0x00007FF81D740000-memory.dmp

      Filesize

      64KB

    • memory/5068-151-0x00007FF81D730000-0x00007FF81D740000-memory.dmp

      Filesize

      64KB

    • memory/5068-152-0x00007FF81D730000-0x00007FF81D740000-memory.dmp

      Filesize

      64KB