Analysis

  • max time kernel
    118s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 10:33

General

  • Target

    46ef92741b21febd56c2545e500972f7ec4b8e7a87428164711c50d889564a93.doc

  • Size

    524KB

  • MD5

    b8eb611067136ae5f8b758f016a18f60

  • SHA1

    b731dc4669e547e78941f393f585fada97836a3d

  • SHA256

    46ef92741b21febd56c2545e500972f7ec4b8e7a87428164711c50d889564a93

  • SHA512

    c39773a745b633722a17da7c758721a21d69615c23376951a8eedd4ea3f5b9dc3b8936c431363c538d47491c29c79bb61a525f5beaf47ed64bca2ad137b8cc4a

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\46ef92741b21febd56c2545e500972f7ec4b8e7a87428164711c50d889564a93.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:520
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\System32\notepad.exe" C:\Users\Admin\AppData\Roaming\after_seeing_how.txt
        2⤵
        • Process spawned unexpected child process
        • Opens file in notepad (likely ransom note)
        PID:1060
      • C:\Windows\SysWOW64\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe"
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of AdjustPrivilegeToken
        PID:468

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\after_seeing_how.txt
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Roaming\after_seeing_how.txt
      Filesize

      7KB

      MD5

      9a5d5b44d4be6b66d7206ba0c9077cf3

      SHA1

      7dd2c5227c9b304b5c4afff676ec3a167252549c

      SHA256

      8af6ed8f57b2296ca55bb5f3e40bc0de10260ca94e7c2f2c997778662c6110e2

      SHA512

      e3ae8ffc5556c2d5222f4a164f7fddd38d08f8496f2cb148248f51430ec23a94f4bd40334c07352ce50cbcf969132d41a1f8c14a4c6b0b432c60c2a3439f155b

    • memory/468-70-0x0000000000000000-mapping.dmp
    • memory/520-60-0x000007FEFBE51000-0x000007FEFBE53000-memory.dmp
      Filesize

      8KB

    • memory/520-59-0x0000000000000000-mapping.dmp
    • memory/1060-67-0x0000000000000000-mapping.dmp
    • memory/1708-62-0x0000000006530000-0x0000000006630000-memory.dmp
      Filesize

      1024KB

    • memory/1708-61-0x0000000006530000-0x0000000006630000-memory.dmp
      Filesize

      1024KB

    • memory/1708-54-0x0000000072971000-0x0000000072974000-memory.dmp
      Filesize

      12KB

    • memory/1708-63-0x0000000006530000-0x0000000006630000-memory.dmp
      Filesize

      1024KB

    • memory/1708-64-0x0000000006530000-0x0000000006630000-memory.dmp
      Filesize

      1024KB

    • memory/1708-65-0x0000000006530000-0x0000000006630000-memory.dmp
      Filesize

      1024KB

    • memory/1708-66-0x0000000006530000-0x0000000006630000-memory.dmp
      Filesize

      1024KB

    • memory/1708-58-0x00000000758D1000-0x00000000758D3000-memory.dmp
      Filesize

      8KB

    • memory/1708-57-0x00000000713DD000-0x00000000713E8000-memory.dmp
      Filesize

      44KB

    • memory/1708-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1708-55-0x00000000703F1000-0x00000000703F3000-memory.dmp
      Filesize

      8KB

    • memory/1708-72-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB