Analysis

  • max time kernel
    104s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-06-2022 19:36

General

  • Target

    salary_ranges.docm

  • Size

    255KB

  • MD5

    ed3b4e9f3e4ecaa892a385bf73637b7d

  • SHA1

    cbe4f0dfe65091ac454323821a87bf4811a4b985

  • SHA256

    20e34ba4bc010f84a75d72ee6dad0b1a0524b56fa5268deb84a3d88c4ed87880

  • SHA512

    bfc5f7db658e893bffe4bc08b4916d1478349198b1b80c822ece134689f171c8ce5334893150cbb6cbacd98f5f8ae4489dcf5a86006f0ffc802057e0eacd7fb1

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://intranet.iml-bank.info:8443/bYdlO5EaAdxEN0U2HZnuJgNIg3DW9OTJnb8evXSt58vYMLdYSI0mna6_pJRRxZXDbngIH_8E88XkC337M3U3EQJNFwHQJtiw8a8bTNqNcc-niwQ-nqOBcnfqorz6aMGUvym9oK5dH3ctbP8zV

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\salary_ranges.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Executes dropped EXE
      PID:1644
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2020

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\file.exe
      Filesize

      72KB

      MD5

      644b38db200b8f0d59fc74c8e252d519

      SHA1

      a293c6ee0fc92e62c22ac1186441a8ef81231403

      SHA256

      aa2b79a78eac63315d2c20a89f28fd1261d9d5e96434c2e015b7dad8e5a043f0

      SHA512

      4908fe977c23fd98bc06082fa8e247fc37661b94878f3271ff4fba067c37d51ca67464b1e0eac1b3ed695cc6416c474260cd7f454518b9ce96af0e8733378a65

    • \Users\Admin\AppData\Local\Temp\file.exe
      Filesize

      72KB

      MD5

      644b38db200b8f0d59fc74c8e252d519

      SHA1

      a293c6ee0fc92e62c22ac1186441a8ef81231403

      SHA256

      aa2b79a78eac63315d2c20a89f28fd1261d9d5e96434c2e015b7dad8e5a043f0

      SHA512

      4908fe977c23fd98bc06082fa8e247fc37661b94878f3271ff4fba067c37d51ca67464b1e0eac1b3ed695cc6416c474260cd7f454518b9ce96af0e8733378a65

    • \Users\Admin\AppData\Local\Temp\file.exe
      Filesize

      72KB

      MD5

      644b38db200b8f0d59fc74c8e252d519

      SHA1

      a293c6ee0fc92e62c22ac1186441a8ef81231403

      SHA256

      aa2b79a78eac63315d2c20a89f28fd1261d9d5e96434c2e015b7dad8e5a043f0

      SHA512

      4908fe977c23fd98bc06082fa8e247fc37661b94878f3271ff4fba067c37d51ca67464b1e0eac1b3ed695cc6416c474260cd7f454518b9ce96af0e8733378a65

    • memory/1644-1217-0x0000000000000000-mapping.dmp
    • memory/1808-84-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-67-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1808-57-0x0000000075BD1000-0x0000000075BD3000-memory.dmp
      Filesize

      8KB

    • memory/1808-58-0x0000000070BCD000-0x0000000070BD8000-memory.dmp
      Filesize

      44KB

    • memory/1808-59-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-60-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-61-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-63-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-62-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-64-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-66-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-65-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-83-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-69-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-68-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-70-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-72-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-73-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-71-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-76-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-77-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-75-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-74-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-91-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-82-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-80-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-79-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-78-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-86-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-87-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-85-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-94-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-55-0x000000006FBE1000-0x000000006FBE3000-memory.dmp
      Filesize

      8KB

    • memory/1808-81-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-92-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-90-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-89-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-88-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-93-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-54-0x0000000072161000-0x0000000072164000-memory.dmp
      Filesize

      12KB

    • memory/1808-95-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-96-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-98-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-97-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-101-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-102-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-100-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-99-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-106-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-107-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-105-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-104-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-103-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-110-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-111-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-109-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-108-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-115-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-114-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-113-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-112-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-116-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-117-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-118-0x0000000000714000-0x0000000000778000-memory.dmp
      Filesize

      400KB

    • memory/1808-1222-0x0000000070BCD000-0x0000000070BD8000-memory.dmp
      Filesize

      44KB

    • memory/1808-1224-0x0000000070BCD000-0x0000000070BD8000-memory.dmp
      Filesize

      44KB

    • memory/2020-1220-0x0000000000000000-mapping.dmp