Resubmissions
07-03-2023 21:18
230307-z5p2nabe8y 1007-03-2023 20:15
230307-y1kqpsbg32 1007-03-2023 12:20
230307-phtffshc7w 10Analysis
-
max time kernel
24s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-03-2023 12:20
Behavioral task
behavioral1
Sample
INVOICE VL18998 07 March 23.doc
Resource
win7-20230220-en
General
-
Target
INVOICE VL18998 07 March 23.doc
-
Size
506.2MB
-
MD5
a57a44cff1336300bbe9f2508cf19e65
-
SHA1
4de86fa9897363f5444105a34c6ae6982cfd4c2c
-
SHA256
cb638551632b271c9993266834e78a2c9a64a4b9deb8590497b0901f1044e6ff
-
SHA512
10413498e5248246da88dad27f7cedf1ad65f7cc94e10a470d65ec3cab000ed53b0e07ae226de7960842f509b54aaa2f2d6f74dd51dcb6b010d0d30362cba493
-
SSDEEP
3072:eoEW2aOtFjH0lP2IpjctfRcVVwEi/A8NVM1wIOCbX6bYLjWFJuvx7ueK6:ZE1aOtFa2I9c3aVw4zwxCbJ4Jup
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1932 1336 regsvr32.exe 26 -
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1336 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1336 WINWORD.EXE 1336 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\INVOICE VL18998 07 March 23.doc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1336 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\132245.tmp"2⤵
- Process spawned unexpected child process
PID:1932 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\132245.tmp"3⤵PID:1956
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\NNNmGbqzpmJww\BiSgfNncoyEAQL.dll"4⤵PID:548
-
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
546.7MB
MD588c37dca6593eed5b057a068bcfefe6a
SHA1450920c2a5f4f3375103fc6a52c61362a67b5a40
SHA256e34f283e6c42994ac9075cde8a341480f9d0a8f85097f8de3b6b4a959bf8c2c9
SHA5127d8cfb4da0fcd73ae923b32fecae2ff2ce233a5ad5ae0e112440e44569605895c372b5d11c76ac496ec05ceac29a8c224246325ecf55bef2efef5dee3d4de8cb
-
Filesize
895KB
MD50da553b8e94586775982d109d55c3164
SHA15f212ff3f80f7b37e4d2fcce68af52db8632a3c3
SHA25683a3d3e42d62c998eee118d60fcdf6a96ae44e276d8dd92f07496237acc49883
SHA512e5c483fe3728581b3a1a40a049b286f6312ab81847f36de40f1fa8d67e94eb62b7a526c6bbc246d421e928e5fc7053aa88cd88758c7ed5c46605f704ec1a6dc5
-
Filesize
527.0MB
MD588daa3429e16ee4c20b1e552361197b0
SHA18067a3fa1c2225f40b9e95bd80ba149bfb6fcf34
SHA2560bbed65de096b623925d32b249ecf435073f3c64dc29c7700c3056127afee312
SHA5126a246691cc46d907183d8bd4b753df11f386b2ac191aa173e4a09dbcb5dcf473bb6064fbb20ccc5625c3d96d9da7daa757abd88ad7c62962f9d05e9728602105
-
Filesize
546.7MB
MD588c37dca6593eed5b057a068bcfefe6a
SHA1450920c2a5f4f3375103fc6a52c61362a67b5a40
SHA256e34f283e6c42994ac9075cde8a341480f9d0a8f85097f8de3b6b4a959bf8c2c9
SHA5127d8cfb4da0fcd73ae923b32fecae2ff2ce233a5ad5ae0e112440e44569605895c372b5d11c76ac496ec05ceac29a8c224246325ecf55bef2efef5dee3d4de8cb