Resubmissions

21-11-2022 09:58

221121-lz1pbaea25 8

21-11-2022 09:57

221121-ly2vzshe2z 8

Analysis

  • max time kernel
    207s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2022 09:58

General

  • Target

    aap_payroll.doc

  • Size

    168KB

  • MD5

    aec27f5a6831b1da8db6f7db1cbca4fb

  • SHA1

    3500ed61c0d1a41b52041906a083ee1a18a8d393

  • SHA256

    71825d7f9a697cf848f97101d3ebe423870d3c44093dad12ec11ebdf18aeb060

  • SHA512

    f0f792e57f692b144d332e23e48aa136244f593307f9088d7c71e0a760e20b46bff6655d9e2943a31121712d8468a4ac92ac85418e29e940a67a15fef664026e

  • SSDEEP

    768:XLPr4j3NB/LHix26MeX4odogwgi4oVQYHgb2BLIiZmmmmmmmI+ZX4ujJOoJIGNj0:wjL/LHix26UoGbgi4JkFI3X7JO8jW

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\aap_payroll.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:240
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:828
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x144
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1388
    • C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE" C:\Users\Admin\AppData\Local\Temp\aap_payroll.pub
      1⤵
      • Drops file in Windows directory
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1636
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Blocklisted process makes network request
        • Suspicious use of AdjustPrivilegeToken
        PID:1060

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • memory/240-60-0x0000000070CCD000-0x0000000070CD8000-memory.dmp

        Filesize

        44KB

      • memory/240-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/240-57-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

        Filesize

        8KB

      • memory/240-58-0x0000000070CCD000-0x0000000070CD8000-memory.dmp

        Filesize

        44KB

      • memory/240-59-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/240-54-0x0000000072261000-0x0000000072264000-memory.dmp

        Filesize

        12KB

      • memory/240-55-0x000000006FCE1000-0x000000006FCE3000-memory.dmp

        Filesize

        8KB

      • memory/828-61-0x000007FEFB741000-0x000007FEFB743000-memory.dmp

        Filesize

        8KB

      • memory/1636-66-0x0000000000000000-mapping.dmp

      • memory/1860-62-0x0000000072301000-0x0000000072303000-memory.dmp

        Filesize

        8KB

      • memory/1860-64-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1860-65-0x00000000732ED000-0x00000000732F8000-memory.dmp

        Filesize

        44KB

      • memory/1860-68-0x00000000732ED000-0x00000000732F8000-memory.dmp

        Filesize

        44KB