Analysis

  • max time kernel
    102s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2023 13:11

General

  • Target

    Form.doc

  • Size

    519.3MB

  • MD5

    91269e08234fdd4423510512fd44d46f

  • SHA1

    599a3716579e3b8c9abc0e56841f0aad7d2a733b

  • SHA256

    29f19644f30582b98f0a79ead304c2ab09abc59d4e5b244b880b32cb45ac1492

  • SHA512

    e00aecd82952d691d22e2f8ee7d00cec1db90fbbfa05159f9c2ba3f7fd92b969b8e1199741b1179a28f8d05e4b873602af62e0f46a9807bbdb09aeb867286811

  • SSDEEP

    6144:QDuxuMOZCBtANveapnaWVgsaNlbfXhoEHC87pnkTnlzIWZ4:18yGZZak8fxJB1e5IWZ4

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Form.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\141241.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\141241.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IgDIcsHxZiLD\IdRHEoBsj.dll"
          4⤵
            PID:1288
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1996

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\141241.tmp

        Filesize

        519.5MB

        MD5

        8369f8222def57832e649eb39fd2e1cb

        SHA1

        d42f215ae5af681e8e0125c7a8399759803f6f01

        SHA256

        290192ceb0b157166d9ae46d4d8980ea2840e91b97411c49dba08da45125e429

        SHA512

        2e9a47cdddc536cd455fa42774bf55d193aea100aa61adaf20f155f9199132b014da2c19327b984eb09537170d40af59fde81396aea3228cf767d31fa42732e6

      • C:\Users\Admin\AppData\Local\Temp\141249.zip

        Filesize

        804KB

        MD5

        7821adc2f937cd7f7f6fc3499ceda7c3

        SHA1

        5e4c4bd7a474c4bebe39b3741ccbc54e524692d4

        SHA256

        95944d22d1e39c3d3f1b7f35fc225b81fd937d711a662b219fa94422e78c8f17

        SHA512

        f850146e6bd3a1a43da0f01db570c8881642aabf3a315db429a1bb2834cfe7baed183f575cd3774948ef5cd485f7a042d580dbb48f77f47a081e967273bb85cb

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        b9109f031440bce034e1ff931dd88279

        SHA1

        bdab46c4a4224156fd00edc779860213707b89df

        SHA256

        2ce5f62d1917ba51bbccfff8063664da64d3740afd5a2c5567a42a6ea9db4afc

        SHA512

        4865fed5c6687731381c0a9d88ebb623d057ebb7dc69b75f54eaac09487463403cdf72851ebcfd7d29c3ba6d800b69f1c7266fd7ff245ef748a1b90858c4ed37

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • \Users\Admin\AppData\Local\Temp\141241.tmp

        Filesize

        519.5MB

        MD5

        8369f8222def57832e649eb39fd2e1cb

        SHA1

        d42f215ae5af681e8e0125c7a8399759803f6f01

        SHA256

        290192ceb0b157166d9ae46d4d8980ea2840e91b97411c49dba08da45125e429

        SHA512

        2e9a47cdddc536cd455fa42774bf55d193aea100aa61adaf20f155f9199132b014da2c19327b984eb09537170d40af59fde81396aea3228cf767d31fa42732e6

      • \Users\Admin\AppData\Local\Temp\141241.tmp

        Filesize

        519.5MB

        MD5

        8369f8222def57832e649eb39fd2e1cb

        SHA1

        d42f215ae5af681e8e0125c7a8399759803f6f01

        SHA256

        290192ceb0b157166d9ae46d4d8980ea2840e91b97411c49dba08da45125e429

        SHA512

        2e9a47cdddc536cd455fa42774bf55d193aea100aa61adaf20f155f9199132b014da2c19327b984eb09537170d40af59fde81396aea3228cf767d31fa42732e6

      • memory/520-103-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-69-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-60-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-62-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-61-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-59-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-63-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-104-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-64-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-66-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-67-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-68-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-70-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-106-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-76-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-77-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-75-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-110-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-80-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-84-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-86-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-87-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-89-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-92-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-93-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-94-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-95-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-97-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-101-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-102-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-57-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-100-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-65-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-58-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-78-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-111-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-112-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-114-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-115-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-116-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-117-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-118-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-119-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-113-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-109-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-108-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-107-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-105-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-99-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-98-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-96-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-91-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-90-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-88-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-85-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-83-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-82-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-81-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-79-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-74-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-73-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-72-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-71-0x00000000003B0000-0x00000000004B0000-memory.dmp

        Filesize

        1024KB

      • memory/520-1605-0x00000000061A0000-0x00000000061A1000-memory.dmp

        Filesize

        4KB

      • memory/520-1895-0x00000000061A0000-0x00000000061A1000-memory.dmp

        Filesize

        4KB

      • memory/520-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/568-1880-0x00000000003A0000-0x00000000003A1000-memory.dmp

        Filesize

        4KB