Analysis

  • max time kernel
    133s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2023 14:12

General

  • Target

    Doc-46771529, MX.doc

  • Size

    515.2MB

  • MD5

    acb9494e9dd6cb5027470040b415ab08

  • SHA1

    bacb7ccd4bca7654d2d47c5b5a78ec29c40871d8

  • SHA256

    209df91aee0f1bf760ffb4ed61b59402a14bf9d721f671ba487863be403e5083

  • SHA512

    20086d852d92e447d7a53a28c0031d826bf293aa25bbc9ce128f894edb1a6525da418cb0059d18f86f6ad5bd04c49ed8c4ca8943d1b480cf61a86c49a448c015

  • SSDEEP

    3072:vpt3LDPYvrTr3jvZNWGBStinoLVMcXyHtt5YC7EGIuGEMYDDK6:H3AvrTPRUGpmpXqWCoGIuGEMY

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Doc-46771529, MX.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\151415.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\151415.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:556
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WgXIc\tGstjAaCGBKIV.dll"
          4⤵
            PID:1932
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1596

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        61KB

        MD5

        e71c8443ae0bc2e282c73faead0a6dd3

        SHA1

        0c110c1b01e68edfacaeae64781a37b1995fa94b

        SHA256

        95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

        SHA512

        b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        2287f15515a8cef4ab7c602a46eeaadf

        SHA1

        48789d6f4acc12ae90dc073976f2af0a2d983a81

        SHA256

        88acbc2100cf2edd5ec28ee7c9e8f17e9fffe54efa1cd9bc1d6c9596044b61a2

        SHA512

        6abc65c6860a022ae87a1ec4f41e63d4232c94896c267ac3d4a36ee70f320f7a2f4a6194efdddda5c5fe8e8e115536120dd00aab65dc134fe49f22920aab0f98

      • C:\Users\Admin\AppData\Local\Temp\151415.tmp

        Filesize

        516.5MB

        MD5

        1261349d9a052d9045af7d26e5e227bd

        SHA1

        898d34fa2d6f2ad9c0cfd70f8a45f0a75b57495d

        SHA256

        74cf3b7e6edf586d3fabd5995fcf1c2ade1f2dad05267b87f6bcb052770d8284

        SHA512

        ce9773919c75c606fe561aa5619a3b2e750d498247e2ac49a869037cb6651ca2e1094400dc40112794e97f44aa292d1019f3454e90a5b441e065057ad8d1073e

      • C:\Users\Admin\AppData\Local\Temp\151426.zip

        Filesize

        801KB

        MD5

        e05927c2656f7131080bee90835bf69b

        SHA1

        2d9523fac83b9813cbedd22dc531805124289793

        SHA256

        256429622c3a0e45baf7c50e358fd6a8a9617ad03b2069e4404a48829183a5fc

        SHA512

        15d7a761682d4ca293ebf977865f1d17b1e96df0f4e4dcee4f8ca658cd521ed1c8f532eae226ddcf51202c0c8bb9ffa9425baaae7f9a2bf0b6fdb34780d79ffc

      • C:\Users\Admin\AppData\Local\Temp\Cab7DCB.tmp

        Filesize

        61KB

        MD5

        fc4666cbca561e864e7fdf883a9e6661

        SHA1

        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

        SHA256

        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

        SHA512

        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

      • C:\Users\Admin\AppData\Local\Temp\Tar812C.tmp

        Filesize

        161KB

        MD5

        be2bec6e8c5653136d3e72fe53c98aa3

        SHA1

        a8182d6db17c14671c3d5766c72e58d87c0810de

        SHA256

        1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

        SHA512

        0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

      • \Users\Admin\AppData\Local\Temp\151415.tmp

        Filesize

        516.5MB

        MD5

        1261349d9a052d9045af7d26e5e227bd

        SHA1

        898d34fa2d6f2ad9c0cfd70f8a45f0a75b57495d

        SHA256

        74cf3b7e6edf586d3fabd5995fcf1c2ade1f2dad05267b87f6bcb052770d8284

        SHA512

        ce9773919c75c606fe561aa5619a3b2e750d498247e2ac49a869037cb6651ca2e1094400dc40112794e97f44aa292d1019f3454e90a5b441e065057ad8d1073e

      • \Users\Admin\AppData\Local\Temp\151415.tmp

        Filesize

        516.5MB

        MD5

        1261349d9a052d9045af7d26e5e227bd

        SHA1

        898d34fa2d6f2ad9c0cfd70f8a45f0a75b57495d

        SHA256

        74cf3b7e6edf586d3fabd5995fcf1c2ade1f2dad05267b87f6bcb052770d8284

        SHA512

        ce9773919c75c606fe561aa5619a3b2e750d498247e2ac49a869037cb6651ca2e1094400dc40112794e97f44aa292d1019f3454e90a5b441e065057ad8d1073e

      • memory/556-928-0x0000000000120000-0x0000000000121000-memory.dmp

        Filesize

        4KB

      • memory/1932-936-0x0000000000170000-0x0000000000171000-memory.dmp

        Filesize

        4KB

      • memory/1992-80-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-83-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-69-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-70-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-72-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-74-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-76-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-75-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-77-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-79-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1992-81-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-82-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-78-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-73-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-68-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-60-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-71-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-84-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-85-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-111-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-67-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-66-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-65-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-64-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-63-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-801-0x0000000006250000-0x0000000006251000-memory.dmp

        Filesize

        4KB

      • memory/1992-62-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-61-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-59-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-58-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB

      • memory/1992-930-0x0000000006250000-0x0000000006251000-memory.dmp

        Filesize

        4KB

      • memory/1992-57-0x00000000004C0000-0x00000000005C0000-memory.dmp

        Filesize

        1024KB