Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-03-2023 13:37
Behavioral task
behavioral1
Sample
59_125804.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
59_125804.doc
Resource
win10v2004-20230221-en
General
-
Target
59_125804.doc
-
Size
540.3MB
-
MD5
5eb04eeef21117669ad8de41e3b7b1cc
-
SHA1
2afb73cb3ea43fb3e81f88929a0f9ef621d5175c
-
SHA256
5b3ff8c7ef3e5a1f2807c561e748f4bfbf9a7e046acf80a761bc6e14428f6b35
-
SHA512
f15879ce7f4199971b03b741e8e379b43ae7f9afaa377870688c5859f24cc98b413e767c302f8066c5d5b58afadebb505d1c1ecdbed726038255cf74193c6f25
-
SSDEEP
6144:QDuxuMOZCBtANveapnaWVgsaNlbfXhoEHC87pnkTnlzIWZ4:18yGZZak8fxJB1e5IWZ4
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1964 1104 regsvr32.exe WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1104 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
WINWORD.EXEpid process 1104 WINWORD.EXE 1104 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1104 WINWORD.EXE 1104 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\59_125804.doc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1104 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\133843.tmp"2⤵
- Process spawned unexpected child process
PID:1964 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\133843.tmp"3⤵PID:2008
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\PTFRgiDIZhGxeNeAS\rZbNAimvzpWHFn.dll"4⤵PID:1460
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446.1MB
MD525733dd207a7c0c6adc3d95295e1e2d8
SHA1b107cb17bf6cdeb31e09e8150970e856b8802c93
SHA25604f3376408f3b5167880debbe744e2e61a03347c111b65eb61c5e3c30bff59c8
SHA512a321cf5e35fdd5b4b0b8ea7eee8a7dc04cf4321af2b71e2e8e1a33fe22e6d90d908935e93b18988493047845002dbf271ca7408024e3420163b6c7ecad79fc3f
-
Filesize
804KB
MD57821adc2f937cd7f7f6fc3499ceda7c3
SHA15e4c4bd7a474c4bebe39b3741ccbc54e524692d4
SHA25695944d22d1e39c3d3f1b7f35fc225b81fd937d711a662b219fa94422e78c8f17
SHA512f850146e6bd3a1a43da0f01db570c8881642aabf3a315db429a1bb2834cfe7baed183f575cd3774948ef5cd485f7a042d580dbb48f77f47a081e967273bb85cb
-
Filesize
20KB
MD538eaad63055d4406ab4941d5eb02f9c8
SHA1c5663521aad9439d994e89f84d75ffefb1e1642b
SHA25694ba0ebfc73f5b4f31e7826f278528d12188c006d13238a8264f234032bab932
SHA512815a7f19898c688ef3d2a4588e5be291b0aaa0d8de6c295ca76e25c32946e955e87f01012e8fbc8727281309848b41d689c08eb77766f0ae7b2a5c5174b2a8b5
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
496.4MB
MD51d2a834d69da5b42940645217f411155
SHA19062fff93a8aeb9803055106767ab8b5aa13a9ac
SHA256b97e52ba63086d06156d5664abe5cbd9e09257368014ff7085d29e487aae9f54
SHA5125ce28bfd5ec2c27fb569e91c86fc71cb4d1452a302c35bba04ab7575e0930feb72d61459505e7d5fbaf1c1ab014697df8b9363fa670acc65dfbbb0bb3eb47dac
-
Filesize
519.5MB
MD58369f8222def57832e649eb39fd2e1cb
SHA1d42f215ae5af681e8e0125c7a8399759803f6f01
SHA256290192ceb0b157166d9ae46d4d8980ea2840e91b97411c49dba08da45125e429
SHA5122e9a47cdddc536cd455fa42774bf55d193aea100aa61adaf20f155f9199132b014da2c19327b984eb09537170d40af59fde81396aea3228cf767d31fa42732e6