Resubmissions

23/09/2022, 18:24

220923-w2gdkahfc3 4

23/09/2022, 07:10

220923-hzqybshdfl 4

Analysis

  • max time kernel
    121s
  • max time network
    235s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23/09/2022, 18:24

General

  • Target

    Etics_Integrity_Compliance__Accountability_-_Pop-Up_Webinar_September_14_2022.docx

  • Size

    53KB

  • MD5

    a0d07d0277301424f630eb4f7663c76e

  • SHA1

    782dcc4d41bb55b82177fba6042e38e5f0ec2736

  • SHA256

    c1934058fa87a23ea9fc249791ee3032ded62dea5555eecb8f2c243701be221d

  • SHA512

    a1605ae47d118766530ca6821799099fde2ba0e50ae8405a30db862f9a3e0082dc184f1dad2f066b6322448276149330fa66ce775ae318a4ef5859f78c72683d

  • SSDEEP

    768:pwNPFQfZSoMLIkLlJlzRD8yoL2B5m2iz4lH+iIbP0WevhsfBWFln83Vrr:iQfbXkpDzZ8P27le70SZGQr

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Etics_Integrity_Compliance__Accountability_-_Pop-Up_Webinar_September_14_2022.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.asp.events/CLIENT_NASBA_287596D2_5056_B733_49DFF69B632BDF66/sites/LearningMarket/media/Documents/2019-standards-and-fos/Fields-of-Study-Document---December-2019.pdf
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1000
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1620

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F

            Filesize

            1KB

            MD5

            0771972b9154b5af92a4115021beb763

            SHA1

            d295fb7e3c0e3cd8abc88deef1e8f25270aa73d8

            SHA256

            5126889c9210995f913baafdf3d6e5ab05dc5b626c94f827afb0e721efa61b60

            SHA512

            6ad8f79cacb43a67bf896a686f8cbfb16473396823e633c67736b7531df7f45e368d6a27b61a8cc0f6ed52ec977e99eeed0fae7923c38f5e527bd4ffb2894aa8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D6243C18F0F8F9AEC6638DD210F1984_E4D8D28185091C91A9C869662D450EA5

            Filesize

            471B

            MD5

            25108f2e1c10a813a3901c7131430586

            SHA1

            1d2208aee885addb0f97a5907f8da0f18a6965f0

            SHA256

            ff1770b2714e8b700aab77529825f21d23bc63cecb92222d46974241084fa122

            SHA512

            93a665a484121f3c6d7e835c9599aebceee798ece423b286bd24bf143ee30076b76438d29a5c8f5283191723cc070f3d17b6619fa0d4f0ca726076e9db6b4126

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

            Filesize

            1KB

            MD5

            c6d56fa4a409b183c6e17eda6bf02eff

            SHA1

            0d45df7b36bfcca5adda65da03994627d580fd75

            SHA256

            85fa343d70fe13c63ca2a0d5ce788001064d4926da6e96ed081899b7b53d6149

            SHA512

            16637d96846e8b3a94f4315b8630661a09d4600c7dd48823c996533a11b8d8091c0e53a05994675ff6e7ff84df86d952f4e41201dc38d870976d8316aa8cf4d8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

            Filesize

            1KB

            MD5

            f890e4c036346e053ae8c529a3f04d1f

            SHA1

            74bfda1dfa471f5478b6476a436a4753d95d9ac6

            SHA256

            92c281beda86b15647070e81175ed7d3ed6d2f5e9ab0b7ad5ed7cd93cf7f8816

            SHA512

            97ceb2e2babfa52c3e8550e39008cfae3d1eec318892bb232ba2fb964166699518fdb624af6ae4f00c34b593feae757052b1b69926c997e8cc5ab1ef6da16a2c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F

            Filesize

            442B

            MD5

            9ca1b1de2ca0fb9837c8b3d097fc1cd0

            SHA1

            3e8c52f083249f6f6810d1bc23467172813227bf

            SHA256

            8cb7f237e89ee23e86ad10735a855b19fe9b77dabc275b8d74d0936aeb00020a

            SHA512

            53dc6cf489ea4a54b309d1c743c11b7450cfa6cd53829cb9f44442074ce7697e30cd09b9f0dd12a9b73c51ab13bb2ca7191a00ddecc49637d30ac46dea1663c7

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D6243C18F0F8F9AEC6638DD210F1984_E4D8D28185091C91A9C869662D450EA5

            Filesize

            418B

            MD5

            e9b82bb2db6da55bfa12d08b51077c07

            SHA1

            6ef2459351f13dffe891fd824f1bd1bf592bac38

            SHA256

            beb2b45572b6925e5303f0170dcf601f0e2628510105001fa2df609c10a628f5

            SHA512

            db6f44479b022c44fb8a81d85b221fad7e8a7bee46fe09b857dfa00d5c4d36596f29e66b7a830a453882cae71b159834d4ee6252dd5c115cb605b3dccab3fd5d

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            3a8543c31fe2ba54a471cbee95793c4f

            SHA1

            9d234a7ae2395bcccfc02cba8c08edfb62e279ce

            SHA256

            f3a8af164d5e6d76b2c9568d91545fa00d9933afdb0f3835dc231413fd91c907

            SHA512

            d10939a06a4505036fbe4d49d903236355b092a336fb9623abae2d51a2fe36f0fc01f77d375eadc52354dced65bd8cf7803c8dd500a127ed9df606d4f14bc02b

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

            Filesize

            458B

            MD5

            4a292875f7ca7aa3cab1d4c34d45e097

            SHA1

            d028b81ab38344d472c4af98cfe0bf0b5d218fa3

            SHA256

            1f027f32764b0983e74902e96ed462ac85ffe060d7e1f173cb35945058ab62d1

            SHA512

            4612a21fb393e6bc71d1f807a2340b4a7d024836d15358aef048534470e7e85f0d55ca3b5155cc6b72d20aa458e9b84ca8aad508b834c7cc4e7c5b460162b6b6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

            Filesize

            432B

            MD5

            e0d2a3c05325e99d34d236d96996bfa0

            SHA1

            3a3b25591c1a8ae40b6d49b503b9672e75f2d04c

            SHA256

            0a4d15dc4c40964e5188e973000385d7fe9b219580a248d4a1d31ff1ba6053ad

            SHA512

            58470f89cf47467ed19bc986db6489b744d9f90908d7c65c5914b3561e4b1b8f7a4f3fd8fcd66fed6289fac6cad04de690ee65dba416a7a5a39b475a8fcf214a

          • memory/1376-57-0x0000000075091000-0x0000000075093000-memory.dmp

            Filesize

            8KB

          • memory/1376-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1376-58-0x00000000711BD000-0x00000000711C8000-memory.dmp

            Filesize

            44KB

          • memory/1376-54-0x0000000072751000-0x0000000072754000-memory.dmp

            Filesize

            12KB

          • memory/1376-55-0x00000000701D1000-0x00000000701D3000-memory.dmp

            Filesize

            8KB

          • memory/1376-59-0x00000000711BD000-0x00000000711C8000-memory.dmp

            Filesize

            44KB

          • memory/1376-71-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1376-72-0x00000000711BD000-0x00000000711C8000-memory.dmp

            Filesize

            44KB

          • memory/1620-70-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp

            Filesize

            8KB