Analysis

  • max time kernel
    130s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-04-2022 19:46

General

  • Target

    Scan761259.docm

  • Size

    123KB

  • MD5

    d3b2a31b7b7a08beb2522c83b473cf09

  • SHA1

    9eaed0b9761e115f899c86bf058da61a19067850

  • SHA256

    a2d68c89f88f4b9517bac131c7557899994baf340587804d9534f9d10719bc6a

  • SHA512

    bc67c2fcacce9856f5d9ad464002819c313e40cc6168d007568be850899ad4831107c82c02e8ce28f08db51e26d5ccead16055cdb6324cfcf12cdccabeda95d4

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Scan761259.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\0.7055475.jse"
      2⤵
      • Process spawned unexpected child process
      PID:1216
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1844

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\0.7055475.jse

      Filesize

      29KB

      MD5

      428bb5eb41277bf98dca217eb4fdcf6a

      SHA1

      d74c30a2be4279392f9f16b6ee5e2335372e3742

      SHA256

      ca3ffca140fbc0ad5a01150f8e84e48aa07cd1547146bd987a3672c394f701ec

      SHA512

      c7f373efd3b1dc6e82c19a7a70abb9d7da089f7f7c8d07d311b3d571f64b565cdac2dabd95c8c207519344db9e90bb770f7bac1cdf375eeaafe059385c3167ae

    • memory/1440-54-0x0000000072101000-0x0000000072104000-memory.dmp

      Filesize

      12KB

    • memory/1440-55-0x000000006FB81000-0x000000006FB83000-memory.dmp

      Filesize

      8KB

    • memory/1440-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1440-57-0x00000000752B1000-0x00000000752B3000-memory.dmp

      Filesize

      8KB

    • memory/1440-58-0x0000000070B6D000-0x0000000070B78000-memory.dmp

      Filesize

      44KB

    • memory/1440-63-0x0000000006070000-0x0000000006CBA000-memory.dmp

      Filesize

      12.3MB

    • memory/1440-65-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1844-64-0x000007FEFB611000-0x000007FEFB613000-memory.dmp

      Filesize

      8KB