Analysis

  • max time kernel
    102s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 04:32

General

  • Target

    78db20517031a83d7cbdd24023e0e556e148af78f12ed292c3f7fca4785dcb4b.docm

  • Size

    123KB

  • MD5

    673d68e62f78d818799583b59927e372

  • SHA1

    f29fec1645e9597502a7d03e9398f104385fa20e

  • SHA256

    78db20517031a83d7cbdd24023e0e556e148af78f12ed292c3f7fca4785dcb4b

  • SHA512

    6fb9edcd090faba6f1adf5c806d32a7e2cc8af4f1cecea325301bd27c0e7bf553cdd6423b406992300637451ad0fe6fd90ca1fe2382ddb6f9e87ef23417be568

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\78db20517031a83d7cbdd24023e0e556e148af78f12ed292c3f7fca4785dcb4b.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\0.7055475.jse"
      2⤵
      • Process spawned unexpected child process
      PID:1988
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1040

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\0.7055475.jse

      Filesize

      29KB

      MD5

      428bb5eb41277bf98dca217eb4fdcf6a

      SHA1

      d74c30a2be4279392f9f16b6ee5e2335372e3742

      SHA256

      ca3ffca140fbc0ad5a01150f8e84e48aa07cd1547146bd987a3672c394f701ec

      SHA512

      c7f373efd3b1dc6e82c19a7a70abb9d7da089f7f7c8d07d311b3d571f64b565cdac2dabd95c8c207519344db9e90bb770f7bac1cdf375eeaafe059385c3167ae

    • memory/1040-98-0x000007FEFBE31000-0x000007FEFBE33000-memory.dmp

      Filesize

      8KB

    • memory/1420-75-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-60-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-59-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-78-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-61-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-65-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-64-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-63-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-62-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-67-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-77-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-69-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-79-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-71-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-70-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-72-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-73-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-74-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-76-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-54-0x0000000072951000-0x0000000072954000-memory.dmp

      Filesize

      12KB

    • memory/1420-66-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-58-0x00000000713BD000-0x00000000713C8000-memory.dmp

      Filesize

      44KB

    • memory/1420-68-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-80-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-82-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-81-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-84-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-83-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-86-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-85-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-87-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-88-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-90-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-89-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-93-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-92-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-91-0x00000000004AF000-0x00000000004B3000-memory.dmp

      Filesize

      16KB

    • memory/1420-101-0x00000000713BD000-0x00000000713C8000-memory.dmp

      Filesize

      44KB

    • memory/1420-57-0x0000000076291000-0x0000000076293000-memory.dmp

      Filesize

      8KB

    • memory/1420-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1420-55-0x00000000703D1000-0x00000000703D3000-memory.dmp

      Filesize

      8KB

    • memory/1420-99-0x00000000713BD000-0x00000000713C8000-memory.dmp

      Filesize

      44KB

    • memory/1420-100-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB