Analysis
-
max time kernel
57s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-03-2023 12:21
Behavioral task
behavioral1
Sample
Invio documento rif.3726532 del 09.03.2023.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Invio documento rif.3726532 del 09.03.2023.doc
Resource
win10v2004-20230220-en
General
-
Target
Invio documento rif.3726532 del 09.03.2023.doc
-
Size
548.3MB
-
MD5
4f2f1cd0d22492311fb31c20c9a8d707
-
SHA1
775544d082f31f0dd98acfc4f000c557f5454de4
-
SHA256
5ffb05c0639e3e5262da53181aa9fd19cef75846a07ab64040b04f705596394f
-
SHA512
af93d1769d23ada2c7c89a84e31c874f81b3cb368c21eb3f617fccb095dee7f4e072673b6e38106089f0622f5c2d2179a8c1e24ccf5a42cd137ed8a9c3579aee
-
SSDEEP
6144:QDuxuMOZCBtANveapnaWVgsaNlbfXhoEHC87pnkTnlzIWZ4:18yGZZak8fxJB1e5IWZ4
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2044 1400 regsvr32.exe WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1400 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
WINWORD.EXEpid process 1400 WINWORD.EXE 1400 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1400 WINWORD.EXE 1400 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Invio documento rif.3726532 del 09.03.2023.doc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1400 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\132211.tmp"2⤵
- Process spawned unexpected child process
PID:2044 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\132211.tmp"3⤵PID:1812
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\PkiFFLECLHkyssZ\uGunRmxWiTGlQO.dll"4⤵PID:1900
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531.5MB
MD5f64544cfce0287fdf9062605f884fc54
SHA1bd5470a805762a371d72a05e48ba397442e0a8e6
SHA25683f604c5e5f6856ab2ccfdb732218f87ea0f5704043f5ec384d8fdcc9a85a513
SHA5122d51dfe44a684305075fc847a652ee04f4bac2900a0f3c677b6a6a70be5201a703a3918993fc994107b66167c7268a1b89b5cf8b53c1fa4af11bff38ef29a7e7
-
Filesize
816KB
MD5792875b3dd621781b5012aad4c44316a
SHA1f6e9e202a8dc07816e2ea06cc00beaf17b8e8bf9
SHA25603e98dc99228da5853b7a86f72a775df3d496b222ad1201e10abd2d2ef6aafb7
SHA512f416501c31534f792d2ea9ee56f11a9131db39030561fbb869d8e49594f81aded4da1383de91266218e6a27a562a1e151b452e3bd3babf0e746d30d341253037
-
Filesize
20KB
MD58c4eef0a59d6ae062a9b60380efe0ca3
SHA1845c1a661af0b9263a7021e6e48b78a712ac441e
SHA256fdd1639a7cef952759ca46d20a1a8a8fa52e11132430bcfd2dac3b6408836f75
SHA5125b73d80a16e0f78c364a53cd27b83e586bfe719b02dbc25fd1c72bede3ce65d9efe4d020fc0eb4c770ec38130d917daec075d68104ce59c2a79db56711ede39a
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
520.3MB
MD590dcab9b1a0b4954f86f277d74312d83
SHA1a02d5cc7971581e6cd70f2988951ac72621ca9fe
SHA256bf99595f9a637f8e5008866016a0cf3c041d8fb02a46c2f07570bf0f65ce92e6
SHA5120075f3ea10ea9a33ba959d495b7babfe5574ced6b1d06f2a353414d7c46722e905bd957d8c3c9680be8debbee5e8292c49013e533d3d02a488e7b97baabb5278
-
Filesize
531.5MB
MD5f64544cfce0287fdf9062605f884fc54
SHA1bd5470a805762a371d72a05e48ba397442e0a8e6
SHA25683f604c5e5f6856ab2ccfdb732218f87ea0f5704043f5ec384d8fdcc9a85a513
SHA5122d51dfe44a684305075fc847a652ee04f4bac2900a0f3c677b6a6a70be5201a703a3918993fc994107b66167c7268a1b89b5cf8b53c1fa4af11bff38ef29a7e7