Resubmissions

09-03-2023 11:57

230309-n44b4scb89 8

09-03-2023 11:49

230309-ny7scabb3t 10

Analysis

  • max time kernel
    102s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2023 11:49

General

  • Target

    Invio documento rif.22954796 del 09.03.2023.doc

  • Size

    545.3MB

  • MD5

    f388af2adf5e1b3c0bb6bcfd71a75951

  • SHA1

    dc269af3c0df4e7dabde4e838639bfa968c4b6f9

  • SHA256

    af7b1a64bcfd9ad2ca2e9bb7a00ca49f3e199dceb7ec188d3906fd3f09dbca48

  • SHA512

    1ab90983739b33ebd7c57d8b3d455e7cc7edff0c5da12df6ea0f76db8b545c8cd5d8b42db795bacc0c7587bff95b078447d717607d89cb195d0befffe8635466

  • SSDEEP

    6144:QDuxuMOZCBtANveapnaWVgsaNlbfXhoEHC87pnkTnlzIWZ4:18yGZZak8fxJB1e5IWZ4

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Invio documento rif.22954796 del 09.03.2023.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\125025.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\125025.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1576
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KyIpNsObs\tjVRBPnbaYIuSZsO.dll"
          4⤵
            PID:1744
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1236

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\125025.tmp
        Filesize

        521.5MB

        MD5

        9646fa8b8fa1aa6be170b81a0046841b

        SHA1

        54516c50a117c983ffa85acab83dfa35ef667904

        SHA256

        bbce9dece94598edf5628487d1420bd57b38d979a5a6d170d9091fe188b5a8a2

        SHA512

        63e61aa9cf547ec68db73345c7a87d0b804853865fec9bd5679c773414e56a2964936b77ebb4d25b902fad23a9e10af150071cf3e333b9cfd5531176602bdce3

      • C:\Users\Admin\AppData\Local\Temp\125030.zip
        Filesize

        806KB

        MD5

        aaccfff0a071afb57724298e5c8e0b3e

        SHA1

        17a763d2535edfa6b5c9f165091b6c08daef07fc

        SHA256

        3f1d83729e12053754741ada50c6a1286aedcd274bf118c08d4be435db31cbac

        SHA512

        d886000bf9cb3e6a3e2f8df1e475cfaeece0cb1ab90e8414b1a36e3abbf0f05d7591b64431b9f565805fd8e2759d7d89b35c47b8ce292190126b1656e2aa320b

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        9508ec998f053c3866d14308b48d95a8

        SHA1

        3e5a24db9cee8bfbd233fc02d698ed62ac334b08

        SHA256

        287a7c90333f98480c38cc311b1e4e6ace6273ef29d30837354791ec63585da9

        SHA512

        2c06482c28774389ed25dc16fcd046da3e943157c069f30de7ab779d083b9939bf31559d6f9cabb7125a811a367b6547fccb2cfb46d0e29de0f8b6575f345e3e

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • \Users\Admin\AppData\Local\Temp\125025.tmp
        Filesize

        521.5MB

        MD5

        9646fa8b8fa1aa6be170b81a0046841b

        SHA1

        54516c50a117c983ffa85acab83dfa35ef667904

        SHA256

        bbce9dece94598edf5628487d1420bd57b38d979a5a6d170d9091fe188b5a8a2

        SHA512

        63e61aa9cf547ec68db73345c7a87d0b804853865fec9bd5679c773414e56a2964936b77ebb4d25b902fad23a9e10af150071cf3e333b9cfd5531176602bdce3

      • \Users\Admin\AppData\Local\Temp\125025.tmp
        Filesize

        521.5MB

        MD5

        9646fa8b8fa1aa6be170b81a0046841b

        SHA1

        54516c50a117c983ffa85acab83dfa35ef667904

        SHA256

        bbce9dece94598edf5628487d1420bd57b38d979a5a6d170d9091fe188b5a8a2

        SHA512

        63e61aa9cf547ec68db73345c7a87d0b804853865fec9bd5679c773414e56a2964936b77ebb4d25b902fad23a9e10af150071cf3e333b9cfd5531176602bdce3

      • memory/904-88-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-72-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-61-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-60-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-62-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-63-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-65-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-64-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-67-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-66-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-69-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-68-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-73-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-90-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-71-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-70-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-78-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-77-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-76-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-75-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-74-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-79-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-80-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-81-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-93-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-83-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-85-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-84-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-87-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-86-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-59-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-89-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-99-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-58-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-82-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-92-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-94-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-95-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-97-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-96-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-91-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-100-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-98-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-101-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-102-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-103-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-104-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-105-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-106-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-107-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-109-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-108-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-111-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-110-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-112-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-114-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-115-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-113-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-117-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-116-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-119-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-118-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/904-1605-0x0000000005F20000-0x0000000005F21000-memory.dmp
        Filesize

        4KB

      • memory/904-1885-0x0000000005F20000-0x0000000005F21000-memory.dmp
        Filesize

        4KB

      • memory/904-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/904-57-0x0000000000460000-0x0000000000560000-memory.dmp
        Filesize

        1024KB

      • memory/1576-1880-0x0000000000130000-0x0000000000131000-memory.dmp
        Filesize

        4KB

      • memory/1744-1887-0x00000000001F0000-0x00000000001F1000-memory.dmp
        Filesize

        4KB