Analysis

  • max time kernel
    144s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2023 12:36

General

  • Target

    PO 2023-03-08_0827, United States.doc

  • Size

    500.3MB

  • MD5

    04167b66dad818acca25dd5c5a177e8b

  • SHA1

    638734594d243a9627ab8c16f867a7d0f741c75c

  • SHA256

    ea55eac0221c35e657fdca5d6f893053a296ea678d0a44d9ac2112f5a88ceaa7

  • SHA512

    61688bdcda4c92a9f24320e1eeaaaeefd8d57359f3b46c61194f60fb3cb9cac2878cb25a45b750a988a4b6be6709189273871d8a37dc7acb23eaffb91313644a

  • SSDEEP

    3072:2JX29m8QBUoItA/leC6gSJ+2JiclnUOvrRxqmLcHeNJxPkdVdTRcDK6:2EmleC6gSJWclU0RxVLcHe5cdTR

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PO 2023-03-08_0827, United States.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\133802.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\133802.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:888
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NtoSVBaeTDYmO\FpmaoCgRxcKIrD.dll"
          4⤵
            PID:1644
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1260

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\133802.tmp

        Filesize

        515.5MB

        MD5

        7a6b230f890aef4a26d3cba45278ad7a

        SHA1

        4b48bcd6ac54fa460f73b58b4927c0f2fb250240

        SHA256

        3588218554350ba24a8d12315059d1184a4630c428927e90b23fa214fe6b5dc7

        SHA512

        02651eab24ebaf5edf72250649cf13c72f09c12b7bf6c13ed0db492a76810a664a934936c5293fc7f0743ba64694e5d084699a8a2648fa6c844ebc260a124005

      • C:\Users\Admin\AppData\Local\Temp\133806.zip

        Filesize

        800KB

        MD5

        535cafe0becc724e6ebb4b69942695b2

        SHA1

        e2fdc0fc83688b346e73aee3723c42182e5af92f

        SHA256

        97ca47dc111012c63309df6ef8f464bc48f570e6da4cfc931372c7d527b4baec

        SHA512

        194d216cc6a61dd2cab77882e8cc725bbda0f1fd211fef89043b674b062eaf2535c921c8f7a1189224ee5c98d17e334217d407f500ecfb765c93f4ed196f2c24

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        83e1de0b812e5507e1eae5449e9de781

        SHA1

        ca69309159611bff340bd43ad638594304dc8e7e

        SHA256

        bbcb654b142a13f715bc0db3e385f41adc6466edd88743b52e2c080db848708c

        SHA512

        fd0f4013ed8a1b608a5af6a32ff5b059edfda0dffb2892c702e677b5b5ad24c812f8c2ace897477cbf005bfbe910f8b354a4823f688a2f01db0c875276c135fb

      • \Users\Admin\AppData\Local\Temp\133802.tmp

        Filesize

        515.5MB

        MD5

        7a6b230f890aef4a26d3cba45278ad7a

        SHA1

        4b48bcd6ac54fa460f73b58b4927c0f2fb250240

        SHA256

        3588218554350ba24a8d12315059d1184a4630c428927e90b23fa214fe6b5dc7

        SHA512

        02651eab24ebaf5edf72250649cf13c72f09c12b7bf6c13ed0db492a76810a664a934936c5293fc7f0743ba64694e5d084699a8a2648fa6c844ebc260a124005

      • \Users\Admin\AppData\Local\Temp\133802.tmp

        Filesize

        515.5MB

        MD5

        7a6b230f890aef4a26d3cba45278ad7a

        SHA1

        4b48bcd6ac54fa460f73b58b4927c0f2fb250240

        SHA256

        3588218554350ba24a8d12315059d1184a4630c428927e90b23fa214fe6b5dc7

        SHA512

        02651eab24ebaf5edf72250649cf13c72f09c12b7bf6c13ed0db492a76810a664a934936c5293fc7f0743ba64694e5d084699a8a2648fa6c844ebc260a124005

      • memory/888-1768-0x0000000000120000-0x0000000000121000-memory.dmp

        Filesize

        4KB

      • memory/1108-93-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-62-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-59-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-61-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-60-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-63-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-64-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-66-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-68-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-69-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-97-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-71-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-72-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-73-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-75-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-76-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-77-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-78-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-79-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-80-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-82-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-83-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-85-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-86-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-88-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-89-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-90-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-91-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-57-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-94-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-1509-0x0000000006130000-0x0000000006131000-memory.dmp

        Filesize

        4KB

      • memory/1108-58-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-70-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-99-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-100-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-101-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-102-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-104-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-105-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-106-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-108-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-109-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-110-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-111-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-113-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-115-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-114-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-112-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-107-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-103-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-98-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-92-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-87-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-84-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-81-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-116-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-74-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-67-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-65-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-96-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-117-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-95-0x00000000007E0000-0x00000000008E0000-memory.dmp

        Filesize

        1024KB

      • memory/1108-1774-0x0000000006130000-0x0000000006131000-memory.dmp

        Filesize

        4KB

      • memory/1108-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB