Analysis

  • max time kernel
    103s
  • max time network
    87s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2023, 10:24

General

  • Target

    INVOICE 589 03_23.doc

  • Size

    526.2MB

  • MD5

    b59808aba76dd0095aa06133382de9ed

  • SHA1

    59aed06213b305d2877031e8ef489064ef74ca74

  • SHA256

    2e116e6a43dcc2ee55df34664a7d5bfae36918f3a8ce5af97be6cb99e3a4de5b

  • SHA512

    134c7c9929c277a3ec0403c2246214059d107c78c0056f8190218e0d16ded3cfaa7a4682d695f9e6212c66220cb222589c8fcd19f6ea70a00994eb06eec6566b

  • SSDEEP

    3072:eoEW2aOtFjH0lP2IpjctfRcVVwEi/A8NVM1wIOCbX6bYLjWFJuvx7ueK6:ZE1aOtFa2I9c3aVw4zwxCbJ4Jup

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\INVOICE 589 03_23.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\112533.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\112533.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:776
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RzgbkcxgBpjyvYPHe\tzZhk.dll"
          4⤵
            PID:992
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:972

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\112533.tmp

              Filesize

              522.7MB

              MD5

              1c303e684f6c3e7c290fcb8d69af758a

              SHA1

              ad884ba9ee33f7839562b938dce7eca27372787b

              SHA256

              82f6277d83395b80a5938895242db48eb381e5d90148d9d36f1b8c5fd2fdf01f

              SHA512

              09d7c729a38f08fd264de57be69306e42a4a1403df55b5909d87b62b9ea33a2d952a75a37df6ae02aa202ed6e36b4015e2e75ca6d264e3880da495bae30312ab

            • C:\Users\Admin\AppData\Local\Temp\112541.zip

              Filesize

              858KB

              MD5

              d5ddd43ec77e41248c11f61b11549a4d

              SHA1

              cd0a0882ea0ff7aafbc46bdf9b04f8eef7484eef

              SHA256

              fc34c3d592129e04cf7aa98b10023d75b6e9cc72dfd6b1a8ae100bd9b5c2c860

              SHA512

              34c18aec4d515ac27cc54c3d5c51f4e7453960dc7c9e81d717f02d5c6f546cebc28bfad563452b528992b2453cf924a022d5e64b53dc204d839f43abac3d4fb8

            • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

              Filesize

              20KB

              MD5

              7afa021dcef070c6fa0db9e9c7f8c931

              SHA1

              cf7ac94b1fd34d7b1e0d3767fc94d6ed7f474a47

              SHA256

              34c3e227f661c609cc72f87c5108d3a512dcea79d31c23e2c8e2919018501cca

              SHA512

              ad70f6b756dfd8ab665983b14d541bc5e58965dcb9e1bc569eae03675a3c15ae4066c4dbd4f651b255f1ace969969693a597579d682feca601e727b78c61d4ed

            • \Users\Admin\AppData\Local\Temp\112533.tmp

              Filesize

              522.7MB

              MD5

              1c303e684f6c3e7c290fcb8d69af758a

              SHA1

              ad884ba9ee33f7839562b938dce7eca27372787b

              SHA256

              82f6277d83395b80a5938895242db48eb381e5d90148d9d36f1b8c5fd2fdf01f

              SHA512

              09d7c729a38f08fd264de57be69306e42a4a1403df55b5909d87b62b9ea33a2d952a75a37df6ae02aa202ed6e36b4015e2e75ca6d264e3880da495bae30312ab

            • \Users\Admin\AppData\Local\Temp\112533.tmp

              Filesize

              522.7MB

              MD5

              1c303e684f6c3e7c290fcb8d69af758a

              SHA1

              ad884ba9ee33f7839562b938dce7eca27372787b

              SHA256

              82f6277d83395b80a5938895242db48eb381e5d90148d9d36f1b8c5fd2fdf01f

              SHA512

              09d7c729a38f08fd264de57be69306e42a4a1403df55b5909d87b62b9ea33a2d952a75a37df6ae02aa202ed6e36b4015e2e75ca6d264e3880da495bae30312ab

            • memory/776-843-0x00000000001A0000-0x00000000001A1000-memory.dmp

              Filesize

              4KB

            • memory/992-848-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/1436-73-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-79-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-66-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-65-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-68-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-67-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-69-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-72-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-70-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-71-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-74-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/1436-75-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-76-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-77-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-64-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-80-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-78-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-81-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-83-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-82-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-84-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-111-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-63-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-62-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-61-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-60-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-59-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-58-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB

            • memory/1436-57-0x0000000000500000-0x0000000000600000-memory.dmp

              Filesize

              1024KB