Analysis

  • max time kernel
    139s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2023, 01:55

General

  • Target

    Candcinstallationservices.doc

  • Size

    501.3MB

  • MD5

    0b73336fd74afdbaa04abb044c6733fd

  • SHA1

    1f91b4b74c9643631318b4d58f6660bb4d292782

  • SHA256

    922116d96a87d62e02fb7571b39e943929b3a9774dc3ddc47c503cecae42d0b1

  • SHA512

    99141d9b8694a12e89134c2ebd91b2887a7011df4b44498ff55471314ca57bfeabbf30ee90800d9b68615b7c730fda496123b1083378b2c44457e22df044f3e6

  • SSDEEP

    6144:xPn4VZXbatu7MDogsDkHS50LdfcGcbz1f5M9KTFrMpSlMK3Ru+Q28:xP4PbNMkgg3Ru+x

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Candcinstallationservices.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\025630.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\025630.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1268
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QsCDCSn\uLsPZ.dll"
          4⤵
            PID:1680
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1608

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\025630.tmp

              Filesize

              534.7MB

              MD5

              85a45fc229c78a99fb7e8efb3a9815d5

              SHA1

              29e2b34d99f0a919a29a542eecb6461f0ac99552

              SHA256

              5f0b862c6e19464ccf334adf37ba845b962f001b7bd0b81645b93df3f7d07035

              SHA512

              0d03eac34901835182569f1f2983f3bb47186a5e36edf35e689d0243eaf4cb780ebb80491277a69c0991ca5b5e1cb8c3c82033ac52c39e6a3fa1c042957e11db

            • C:\Users\Admin\AppData\Local\Temp\025633.zip

              Filesize

              858KB

              MD5

              4f88ae2ced6ae0d49d4a2ac6818f0370

              SHA1

              5cc61ba79259bac960d312dc657c82d36e6f10d1

              SHA256

              e5dbb1fa125df10fc419da2d0415d08eb0698547790ba5c2ab23364ba61203d3

              SHA512

              3aa8906e788de272fa38c2053ea1471887471493a6c4b05549475ce4a07bf26762f438011aefa1c926e2025a53868be4de6fd203bf1c9d660c86be865b8798de

            • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

              Filesize

              20KB

              MD5

              cf9a012ef9296b28f7beab5a1da9caad

              SHA1

              fa2704cfc169cfc4daa04817f5d16bbf1b1a3971

              SHA256

              1ee0d239df59274161d082e16371cfd6b207adbcc1e44ab7a010a858d7450f2e

              SHA512

              7e5ba807b65fcfddd270971bc7c6d8c8e9732fea7f160ddec72a50984a0acbacad487c42f3cf51b29010f75ba9d9ed79f5de080dbbd785e52cb51203cd1bd6df

            • \Users\Admin\AppData\Local\Temp\025630.tmp

              Filesize

              534.7MB

              MD5

              85a45fc229c78a99fb7e8efb3a9815d5

              SHA1

              29e2b34d99f0a919a29a542eecb6461f0ac99552

              SHA256

              5f0b862c6e19464ccf334adf37ba845b962f001b7bd0b81645b93df3f7d07035

              SHA512

              0d03eac34901835182569f1f2983f3bb47186a5e36edf35e689d0243eaf4cb780ebb80491277a69c0991ca5b5e1cb8c3c82033ac52c39e6a3fa1c042957e11db

            • \Users\Admin\AppData\Local\Temp\025630.tmp

              Filesize

              534.7MB

              MD5

              85a45fc229c78a99fb7e8efb3a9815d5

              SHA1

              29e2b34d99f0a919a29a542eecb6461f0ac99552

              SHA256

              5f0b862c6e19464ccf334adf37ba845b962f001b7bd0b81645b93df3f7d07035

              SHA512

              0d03eac34901835182569f1f2983f3bb47186a5e36edf35e689d0243eaf4cb780ebb80491277a69c0991ca5b5e1cb8c3c82033ac52c39e6a3fa1c042957e11db

            • memory/1268-1264-0x00000000002C0000-0x00000000002C1000-memory.dmp

              Filesize

              4KB

            • memory/1680-1270-0x0000000000170000-0x0000000000171000-memory.dmp

              Filesize

              4KB

            • memory/2008-86-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-98-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-87-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-89-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-88-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-90-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-91-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-92-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-93-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-94-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-96-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-97-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-95-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/2008-121-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-163-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-205-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-85-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-1077-0x00000000061B0000-0x00000000061B1000-memory.dmp

              Filesize

              4KB

            • memory/2008-83-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-84-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-82-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-81-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-80-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB

            • memory/2008-1271-0x00000000061B0000-0x00000000061B1000-memory.dmp

              Filesize

              4KB

            • memory/2008-79-0x0000000000630000-0x0000000000730000-memory.dmp

              Filesize

              1024KB