Analysis

  • max time kernel
    106s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 05:26

General

  • Target

    [Klip 고객센터]오전송_토큰해결_안내.doc

  • Size

    115KB

  • MD5

    7cf2a5dfb0c0777e0670aea29cb3a97b

  • SHA1

    ddbcdccf41d8386ae5183415c3ce139a6a010efb

  • SHA256

    313a743ed5558caa203fd873c22a178d6e4fed8c3ca75d40f827eeedccf31c37

  • SHA512

    e87fbf56de867d4b895db24dd7c7abb2fedfcf020ed004e636bb5bf4b5b51b8f9a2da534b7077eab822b42f939891c217ca162d4b1334bf3ded7bbc611fbb92c

  • SSDEEP

    3072:WFJ6s9d9fP4LvppgFS8tvJpIl/2016CMnryG1e:bs9grpwSQpIl7IryMe

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\[Klip 고객센터]오전송_토큰해결_안내.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1496
    • C:\Windows\system32\wscript.exe
      wscript.exe //e:vbscript //b C:\Users\Admin\AppData\Roaming\Microsoft\Templates\1589989024.xml
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      PID:1944

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\1589989024.xml
      Filesize

      190B

      MD5

      eb7426a8b9e544057246dbb2027d6f3f

      SHA1

      8646086619816068ffcdde0d440dee3b45db3a18

      SHA256

      65e4b48d32aececc74fcecbee233ab8d83e60199c6e7b0b0aeaf55d1652fd607

      SHA512

      60b36164e7e7cc078d9097990680ee2233662d015918abc5a9ff5a797003f702a5cb1de640272678642cd806aa02bc37120aa9ba7f619fe87f64e737a14ca00e

    • memory/960-64-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-57-0x00000000757A1000-0x00000000757A3000-memory.dmp
      Filesize

      8KB

    • memory/960-71-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-58-0x000000007156D000-0x0000000071578000-memory.dmp
      Filesize

      44KB

    • memory/960-59-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-60-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-61-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-62-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-77-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-54-0x0000000072B01000-0x0000000072B04000-memory.dmp
      Filesize

      12KB

    • memory/960-107-0x000000007156D000-0x0000000071578000-memory.dmp
      Filesize

      44KB

    • memory/960-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/960-63-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-83-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-89-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-95-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-55-0x0000000070581000-0x0000000070583000-memory.dmp
      Filesize

      8KB

    • memory/960-65-0x0000000000778000-0x000000000077C000-memory.dmp
      Filesize

      16KB

    • memory/960-103-0x000000007156D000-0x0000000071578000-memory.dmp
      Filesize

      44KB

    • memory/960-106-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1496-104-0x0000000000000000-mapping.dmp
    • memory/1944-102-0x000007FEFC011000-0x000007FEFC013000-memory.dmp
      Filesize

      8KB