Resubmissions

09-03-2023 23:18

230309-3ase3scd7z 8

09-03-2023 20:03

230309-ys1rysbf8x 10

Analysis

  • max time kernel
    152s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2023 20:03

General

  • Target

    payment.doc

  • Size

    535.3MB

  • MD5

    7b7d867d75208d0b29fd085dc361b3a5

  • SHA1

    de46e975ee50e60fad1c242e947cc2888fdd1ca2

  • SHA256

    c5cb7f97846bc2e1505e89df5483889b519d6d004f34da44a0703a232b33902f

  • SHA512

    6c513b6f8351cc74032bf6c4f7f4377a65e24f1c6b25b0c4ed27d7c649c240752cf3c267ca99a81d2063c771366bd29394fdf37c38c6257d27abf137380e5485

  • SSDEEP

    3072:PdObXXXW20dj1sZQ5hVYyQmBKe4ltVBjSBkzmlykp7WTDIrV2Dl9QjdDK6:YXW2M5V5oe4lBjSOz8zp7YDIr0BE

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\payment.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\210512.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1260
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\210512.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:564
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YuTlBWv\mfUEuaRp.dll"
          4⤵
            PID:1588
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:328

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\210512.tmp

        Filesize

        519.5MB

        MD5

        8369f8222def57832e649eb39fd2e1cb

        SHA1

        d42f215ae5af681e8e0125c7a8399759803f6f01

        SHA256

        290192ceb0b157166d9ae46d4d8980ea2840e91b97411c49dba08da45125e429

        SHA512

        2e9a47cdddc536cd455fa42774bf55d193aea100aa61adaf20f155f9199132b014da2c19327b984eb09537170d40af59fde81396aea3228cf767d31fa42732e6

      • C:\Users\Admin\AppData\Local\Temp\210515.zip

        Filesize

        804KB

        MD5

        e3173165af347d1aec8af5ef85a85f66

        SHA1

        b74326a23a1ece5931126f677ed4c1da2b6d22fc

        SHA256

        02d74f09b6573f9f16ad664ea564d774517326512a48eceb2fbf482eef9f583f

        SHA512

        d8f285e1d3cc3f4e35fbb3eab4255abf1853a066854f2f126918c887ee8d4ab5f693d8eda4c16f0f41a2f8b73775d4a177131fbaa63b2b6009d2b3e4975d8b9d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        049a3a06d3533a7f29b86ad29a0bbd81

        SHA1

        aa99aeaafc5502328dcbfda66b43d826b0d31c75

        SHA256

        4dd6d237968e9238fa3c2c61e611e06522cb29b2b5140f16b68f4ec0f43041c5

        SHA512

        786a94f6b3109926406be5ef50ac2b535d09898d65cbac7e28fdafd40b985f68432b687d56fa04c6169046ac066ce1604cd325bea9b052dc650bfd59e7f13cc6

      • \Users\Admin\AppData\Local\Temp\210512.tmp

        Filesize

        519.5MB

        MD5

        8369f8222def57832e649eb39fd2e1cb

        SHA1

        d42f215ae5af681e8e0125c7a8399759803f6f01

        SHA256

        290192ceb0b157166d9ae46d4d8980ea2840e91b97411c49dba08da45125e429

        SHA512

        2e9a47cdddc536cd455fa42774bf55d193aea100aa61adaf20f155f9199132b014da2c19327b984eb09537170d40af59fde81396aea3228cf767d31fa42732e6

      • \Users\Admin\AppData\Local\Temp\210512.tmp

        Filesize

        519.5MB

        MD5

        8369f8222def57832e649eb39fd2e1cb

        SHA1

        d42f215ae5af681e8e0125c7a8399759803f6f01

        SHA256

        290192ceb0b157166d9ae46d4d8980ea2840e91b97411c49dba08da45125e429

        SHA512

        2e9a47cdddc536cd455fa42774bf55d193aea100aa61adaf20f155f9199132b014da2c19327b984eb09537170d40af59fde81396aea3228cf767d31fa42732e6

      • memory/564-1236-0x00000000002A0000-0x00000000002A1000-memory.dmp

        Filesize

        4KB

      • memory/1588-1243-0x00000000003B0000-0x00000000003B1000-memory.dmp

        Filesize

        4KB

      • memory/1948-78-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-86-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-60-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-61-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-63-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-64-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-65-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-66-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-67-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-69-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-68-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-72-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-73-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-74-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-70-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-76-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-77-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-80-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-81-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-58-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-82-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-83-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-85-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-59-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-89-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-88-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-90-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-91-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-93-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-94-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-95-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-96-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-97-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-92-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-87-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-84-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-79-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-75-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-71-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-62-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-98-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-1053-0x0000000006340000-0x0000000006341000-memory.dmp

        Filesize

        4KB

      • memory/1948-1237-0x0000000006340000-0x0000000006341000-memory.dmp

        Filesize

        4KB

      • memory/1948-57-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1948-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB