Analysis

  • max time kernel
    135s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-06-2022 18:48

General

  • Target

    14bd8ce373bf64dc8f78775f284ce5449cc350796a4b53c27505c4f9bcba0379.docm

  • Size

    51KB

  • MD5

    577eab90797f2804a44cce6241eb9c22

  • SHA1

    6bee48fb567b6f0acc2cd129741f0351b961c89f

  • SHA256

    14bd8ce373bf64dc8f78775f284ce5449cc350796a4b53c27505c4f9bcba0379

  • SHA512

    e5a5140424c5dcfccd2dafc34bdf2232dd2d046dd933f47053b9278ccf1f67e3a61110da0c81c9f419a42a0a4538c97c5dba1b8a6dba800d0186b69a07d9770c

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://191.101.42.179:8080/HxJOy7n0CJvydvN3qZ2FLgqSDe-upNDe0J0Ts0S_QVE3U8qmdyykRSnD6T_HvD7La8DNmDu0GFUno6sSH6E1kyH1KFLrK-sU2mx6mwqnG4gBWa7BSH61LeWes6_ip9ijxEIdPAmYbrc9mOjG3ohA4KJrSn_hMCCfI9Pc_7hBhp

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\14bd8ce373bf64dc8f78775f284ce5449cc350796a4b53c27505c4f9bcba0379.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:956
      • C:\Users\Admin\txqTrPLp.exe
        txqTrPLp.exe
        2⤵
        • Executes dropped EXE
        PID:856

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\txqTrPLp.exe
      Filesize

      4KB

      MD5

      4788af93cfbfc6fa40602c34205e8f78

      SHA1

      27846a108f37d617ea2b062673a7cddb62ea1a71

      SHA256

      212f19c7162e353259d30000502c8bc7b938f26398596beaff56dbf2577f8307

      SHA512

      3c70a46284006805ab14d99b834c1192a31ebe4912312e6d4a9b6db5d608d5603c8210e47c5eefc85ebf9d1e648aff53043f0d64d64c66fe58482df9b6d27746

    • \Users\Admin\txqTrPLp.exe
      Filesize

      4KB

      MD5

      4788af93cfbfc6fa40602c34205e8f78

      SHA1

      27846a108f37d617ea2b062673a7cddb62ea1a71

      SHA256

      212f19c7162e353259d30000502c8bc7b938f26398596beaff56dbf2577f8307

      SHA512

      3c70a46284006805ab14d99b834c1192a31ebe4912312e6d4a9b6db5d608d5603c8210e47c5eefc85ebf9d1e648aff53043f0d64d64c66fe58482df9b6d27746

    • \Users\Admin\txqTrPLp.exe
      Filesize

      4KB

      MD5

      4788af93cfbfc6fa40602c34205e8f78

      SHA1

      27846a108f37d617ea2b062673a7cddb62ea1a71

      SHA256

      212f19c7162e353259d30000502c8bc7b938f26398596beaff56dbf2577f8307

      SHA512

      3c70a46284006805ab14d99b834c1192a31ebe4912312e6d4a9b6db5d608d5603c8210e47c5eefc85ebf9d1e648aff53043f0d64d64c66fe58482df9b6d27746

    • memory/856-93-0x0000000000400000-0x0000000000404000-memory.dmp
      Filesize

      16KB

    • memory/856-88-0x0000000000000000-mapping.dmp
    • memory/956-79-0x0000000000000000-mapping.dmp
    • memory/956-80-0x000007FEFBAF1000-0x000007FEFBAF3000-memory.dmp
      Filesize

      8KB

    • memory/1648-60-0x0000000000548000-0x0000000000550000-memory.dmp
      Filesize

      32KB

    • memory/1648-59-0x0000000000548000-0x0000000000550000-memory.dmp
      Filesize

      32KB

    • memory/1648-63-0x0000000000548000-0x0000000000550000-memory.dmp
      Filesize

      32KB

    • memory/1648-64-0x0000000000548000-0x0000000000550000-memory.dmp
      Filesize

      32KB

    • memory/1648-69-0x0000000000548000-0x0000000000550000-memory.dmp
      Filesize

      32KB

    • memory/1648-74-0x0000000000548000-0x0000000000550000-memory.dmp
      Filesize

      32KB

    • memory/1648-61-0x0000000000548000-0x0000000000550000-memory.dmp
      Filesize

      32KB

    • memory/1648-54-0x0000000072471000-0x0000000072474000-memory.dmp
      Filesize

      12KB

    • memory/1648-81-0x0000000000548000-0x0000000000550000-memory.dmp
      Filesize

      32KB

    • memory/1648-62-0x0000000000548000-0x0000000000550000-memory.dmp
      Filesize

      32KB

    • memory/1648-58-0x0000000070EDD000-0x0000000070EE8000-memory.dmp
      Filesize

      44KB

    • memory/1648-57-0x00000000755C1000-0x00000000755C3000-memory.dmp
      Filesize

      8KB

    • memory/1648-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1648-92-0x0000000002150000-0x0000000002154000-memory.dmp
      Filesize

      16KB

    • memory/1648-91-0x0000000002150000-0x0000000002154000-memory.dmp
      Filesize

      16KB

    • memory/1648-55-0x000000006FEF1000-0x000000006FEF3000-memory.dmp
      Filesize

      8KB

    • memory/1648-94-0x0000000070EDD000-0x0000000070EE8000-memory.dmp
      Filesize

      44KB

    • memory/1648-95-0x0000000002150000-0x0000000002154000-memory.dmp
      Filesize

      16KB

    • memory/1648-96-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1648-97-0x0000000070EDD000-0x0000000070EE8000-memory.dmp
      Filesize

      44KB