Analysis

  • max time kernel
    128s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2023, 12:56

General

  • Target

    Innovincconferences.doc

  • Size

    526.3MB

  • MD5

    92206ffa2c3b5c2f3ec57322092bd85b

  • SHA1

    e7db6210a7b597a738a684858c5dbde53219e998

  • SHA256

    6fa3395769fdf3118a8723f8a3084fb85bdc2a7634c6c4256eb03b1242c9eb0e

  • SHA512

    8898e95ec0ddd28dc94f8cf4ca5be1989f92cea8ac58799d6a097b2491363c4f77edb215cc9ba75b66c9576f980b865b341a2877169f24ac1d9bd62b60221684

  • SSDEEP

    6144:QDuxuMOZCBtANveapnaWVgsaNlbfXhoEHC87pnkTnlzIWZ4:18yGZZak8fxJB1e5IWZ4

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Innovincconferences.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\135701.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\135701.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1184
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AQsEXkFZSHiAquRJq\wKwJYuvdr.dll"
          4⤵
            PID:1940
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1388

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\135701.tmp

        Filesize

        519.5MB

        MD5

        8369f8222def57832e649eb39fd2e1cb

        SHA1

        d42f215ae5af681e8e0125c7a8399759803f6f01

        SHA256

        290192ceb0b157166d9ae46d4d8980ea2840e91b97411c49dba08da45125e429

        SHA512

        2e9a47cdddc536cd455fa42774bf55d193aea100aa61adaf20f155f9199132b014da2c19327b984eb09537170d40af59fde81396aea3228cf767d31fa42732e6

      • C:\Users\Admin\AppData\Local\Temp\135709.zip

        Filesize

        804KB

        MD5

        7821adc2f937cd7f7f6fc3499ceda7c3

        SHA1

        5e4c4bd7a474c4bebe39b3741ccbc54e524692d4

        SHA256

        95944d22d1e39c3d3f1b7f35fc225b81fd937d711a662b219fa94422e78c8f17

        SHA512

        f850146e6bd3a1a43da0f01db570c8881642aabf3a315db429a1bb2834cfe7baed183f575cd3774948ef5cd485f7a042d580dbb48f77f47a081e967273bb85cb

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        21eb6f208625e16891026c7c00912773

        SHA1

        82e8a8aebf8bd1b1df15f9bd3a6442cfaedd203b

        SHA256

        0b115218ec3d38d046c82a70a4cfeb3b7c4f7202d2ff87df3f5de897cb67b49e

        SHA512

        566cbae921559d2d607145f346a6949bdb1ec1880175bd2cac5285ecbafa96f43e46ef1fa19c91a92193a96ec56472c531634ddd565dd2ace6e332c372647503

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • \Users\Admin\AppData\Local\Temp\135701.tmp

        Filesize

        519.5MB

        MD5

        8369f8222def57832e649eb39fd2e1cb

        SHA1

        d42f215ae5af681e8e0125c7a8399759803f6f01

        SHA256

        290192ceb0b157166d9ae46d4d8980ea2840e91b97411c49dba08da45125e429

        SHA512

        2e9a47cdddc536cd455fa42774bf55d193aea100aa61adaf20f155f9199132b014da2c19327b984eb09537170d40af59fde81396aea3228cf767d31fa42732e6

      • \Users\Admin\AppData\Local\Temp\135701.tmp

        Filesize

        519.5MB

        MD5

        8369f8222def57832e649eb39fd2e1cb

        SHA1

        d42f215ae5af681e8e0125c7a8399759803f6f01

        SHA256

        290192ceb0b157166d9ae46d4d8980ea2840e91b97411c49dba08da45125e429

        SHA512

        2e9a47cdddc536cd455fa42774bf55d193aea100aa61adaf20f155f9199132b014da2c19327b984eb09537170d40af59fde81396aea3228cf767d31fa42732e6

      • memory/1184-1880-0x00000000001C0000-0x00000000001C1000-memory.dmp

        Filesize

        4KB

      • memory/1940-1883-0x00000000004C0000-0x00000000004C1000-memory.dmp

        Filesize

        4KB

      • memory/1948-93-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-101-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-98-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-62-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-64-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-65-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-67-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-68-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-69-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-70-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-71-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-72-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-73-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-76-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-75-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-78-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-80-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-79-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-81-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-84-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-85-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-82-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-87-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-88-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-89-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-90-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-91-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-92-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-59-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-95-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-96-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-97-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-61-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-60-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-109-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-102-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-103-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-105-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-106-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-107-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-108-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-100-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-111-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-112-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-113-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-114-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-115-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-117-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-119-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-118-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-116-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-110-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-104-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-99-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-94-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-86-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-83-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-77-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-74-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-66-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-63-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-1605-0x0000000006380000-0x0000000006381000-memory.dmp

        Filesize

        4KB

      • memory/1948-1881-0x0000000006380000-0x0000000006381000-memory.dmp

        Filesize

        4KB

      • memory/1948-58-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-57-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB