Analysis

  • max time kernel
    107s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2022 03:38

General

  • Target

    册2 相关支持性材料/4-2-1 国内流行病学数据或销量数据等支撑材料/抗抑郁药的销量数据.docx

  • Size

    1.5MB

  • MD5

    122569f4ed2036ffa8adcb7a48db3e81

  • SHA1

    adbce96f63c1f0201d443e4cfe6bcb11c0099d06

  • SHA256

    cfa01655e5d8af15095cdfd204e3134dab5bf99ec836ab54251343fd851d86a4

  • SHA512

    625ab99f7cf1b60ab7b970bd3c77cf264e52ee1a66e4950040106a1e8605ad78c2462fd00161ebb5614e6e147c8af73a313a516747c10befc61e3abdc9a1e1f5

  • SSDEEP

    24576:gafDaT77Hq2JV4TpTMCMhbZhCG8iCxDF5j+3e++4W:3fDaT77HqKV4Tpj2C4CxDF5Ch+x

Score
6/10

Malware Config

Signatures

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\册2 相关支持性材料\4-2-1 国内流行病学数据或销量数据等支撑材料\抗抑郁药的销量数据.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1424
      • C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE
        "C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 996
        2⤵
        • Process spawned suspicious child process
        • Suspicious use of WriteProcessMemory
        PID:580
        • C:\Windows\SysWOW64\dwwin.exe
          C:\Windows\system32\dwwin.exe -x -s 996
          3⤵
            PID:1564

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7177730.cvr
        Filesize

        1KB

        MD5

        dac7a17ebff8970495a3cbfc33055581

        SHA1

        4448f510f2a5a38df9494f5e9cdc9ea3078beb9b

        SHA256

        52f095334e170730fa4050964d4117dbcbd68272ddb9f3d5b7b634f266e71ec1

        SHA512

        6d69a3c0f0baebcd2f5fe5eef42be86c990a143a6a0fabab67ccddfe086b298fca6b069222cc48b93d9a30d5b3573a5ce89c191e1c3e7f0578e554be581feae4

      • memory/580-62-0x0000000000000000-mapping.dmp
      • memory/1424-59-0x0000000000000000-mapping.dmp
      • memory/1424-60-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp
        Filesize

        8KB

      • memory/1564-64-0x0000000000000000-mapping.dmp
      • memory/1836-54-0x0000000071FF1000-0x0000000071FF4000-memory.dmp
        Filesize

        12KB

      • memory/1836-55-0x000000006FA71000-0x000000006FA73000-memory.dmp
        Filesize

        8KB

      • memory/1836-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1836-57-0x0000000070A5D000-0x0000000070A68000-memory.dmp
        Filesize

        44KB

      • memory/1836-58-0x0000000075771000-0x0000000075773000-memory.dmp
        Filesize

        8KB

      • memory/1836-61-0x0000000070A5D000-0x0000000070A68000-memory.dmp
        Filesize

        44KB

      • memory/1836-67-0x0000000070A5D000-0x0000000070A68000-memory.dmp
        Filesize

        44KB