Analysis

  • max time kernel
    103s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2022 16:20

General

  • Target

    Thongtin_giaodich.doc

  • Size

    471KB

  • MD5

    559d7ad28cb906d92db2941cb95f54f4

  • SHA1

    1f1d44808a3bea79ee74917e8aa068975b86f884

  • SHA256

    d18dfce94a59ae3db12d3661f0adb113c4f156e0a3427dedc694d30ec5b89366

  • SHA512

    38ac7f86ba75d4704e95a7518ee9e475900c86af9462e4cebc89c43de9e8a147302350f494d332c67d7fb65d4e6768116881e718eab8478147476651861ca9f0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Thongtin_giaodich.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:636
    • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Users\Admin\AppData\Roaming\Microsoft\Word\ListGel.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Word\ListGel.exe" db9fd1b52671a4eac2a54c88fac26f3d
        2⤵
        • Executes dropped EXE
        PID:1096

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Word\ListGel.exe
      Filesize

      304KB

      MD5

      5b0c0f3f26ed951aa4800ccbfb9b298c

      SHA1

      f07a89d23fb2114ddfab9d5975ae9ddc1a4c8db8

      SHA256

      675401330e563dbda06d9594f8168e77359856d641eb00b6ec897155e082f6de

      SHA512

      c6299a4e14e4d3f3daccda50fdc55205bb33854297e547ce014916623e48c09454c42b21bb7eb4aeedf417b1bec3749b1ed4a701249b4fc46630ceb9c9cdbd4b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Word\ListGel.exe
      Filesize

      304KB

      MD5

      5b0c0f3f26ed951aa4800ccbfb9b298c

      SHA1

      f07a89d23fb2114ddfab9d5975ae9ddc1a4c8db8

      SHA256

      675401330e563dbda06d9594f8168e77359856d641eb00b6ec897155e082f6de

      SHA512

      c6299a4e14e4d3f3daccda50fdc55205bb33854297e547ce014916623e48c09454c42b21bb7eb4aeedf417b1bec3749b1ed4a701249b4fc46630ceb9c9cdbd4b

    • \Users\Admin\AppData\Roaming\Microsoft\Word\ListGel.exe
      Filesize

      304KB

      MD5

      5b0c0f3f26ed951aa4800ccbfb9b298c

      SHA1

      f07a89d23fb2114ddfab9d5975ae9ddc1a4c8db8

      SHA256

      675401330e563dbda06d9594f8168e77359856d641eb00b6ec897155e082f6de

      SHA512

      c6299a4e14e4d3f3daccda50fdc55205bb33854297e547ce014916623e48c09454c42b21bb7eb4aeedf417b1bec3749b1ed4a701249b4fc46630ceb9c9cdbd4b

    • \Users\Admin\AppData\Roaming\Microsoft\Word\ListGel.exe
      Filesize

      304KB

      MD5

      5b0c0f3f26ed951aa4800ccbfb9b298c

      SHA1

      f07a89d23fb2114ddfab9d5975ae9ddc1a4c8db8

      SHA256

      675401330e563dbda06d9594f8168e77359856d641eb00b6ec897155e082f6de

      SHA512

      c6299a4e14e4d3f3daccda50fdc55205bb33854297e547ce014916623e48c09454c42b21bb7eb4aeedf417b1bec3749b1ed4a701249b4fc46630ceb9c9cdbd4b

    • memory/636-73-0x0000000000000000-mapping.dmp
    • memory/636-74-0x000007FEFBCC1000-0x000007FEFBCC3000-memory.dmp
      Filesize

      8KB

    • memory/856-76-0x000000007121D000-0x0000000071228000-memory.dmp
      Filesize

      44KB

    • memory/856-63-0x000000007121D000-0x0000000071228000-memory.dmp
      Filesize

      44KB

    • memory/856-65-0x000000006A251000-0x000000006A253000-memory.dmp
      Filesize

      8KB

    • memory/856-66-0x00000000699F1000-0x00000000699F3000-memory.dmp
      Filesize

      8KB

    • memory/1096-70-0x0000000000000000-mapping.dmp
    • memory/1248-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1248-57-0x0000000075351000-0x0000000075353000-memory.dmp
      Filesize

      8KB

    • memory/1248-59-0x0000000000524000-0x0000000000528000-memory.dmp
      Filesize

      16KB

    • memory/1248-55-0x0000000070231000-0x0000000070233000-memory.dmp
      Filesize

      8KB

    • memory/1248-54-0x00000000727B1000-0x00000000727B4000-memory.dmp
      Filesize

      12KB

    • memory/1248-58-0x000000007121D000-0x0000000071228000-memory.dmp
      Filesize

      44KB

    • memory/1248-75-0x000000007121D000-0x0000000071228000-memory.dmp
      Filesize

      44KB

    • memory/1248-60-0x0000000000524000-0x0000000000528000-memory.dmp
      Filesize

      16KB

    • memory/1248-77-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1248-78-0x000000007121D000-0x0000000071228000-memory.dmp
      Filesize

      44KB