Analysis

  • max time kernel
    105s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11-03-2023 00:41

General

  • Target

    2023-03-09_1317.doc

  • Size

    543.2MB

  • MD5

    ca7c317bbef156ff2d0216f3427621b0

  • SHA1

    d3c7b6bfe036cde857f1648a078559941d8ce18d

  • SHA256

    b7778c16fa857b4e5d970e72f1763c24f7ba9fb6ec46bc6c55cbee55c7400d3b

  • SHA512

    6fe767ddb213c142f6e40896d4e290c348a743a1882e9e94538ccb43110a32ba3166f326d437929df9c5c5d39710d62ee7e14a0f01b712a95bd557244e91c859

  • SSDEEP

    3072:vpt3LDPYvrTr3jvZNWGBStinoLVMcXyHtt5YC7EGIuGEMYDDK6:H3AvrTPRUGpmpXqWCoGIuGEMY

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2023-03-09_1317.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\014211.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:764
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\014211.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1476
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AbiUtwlXugOVOqz\ORmGSESyauybx.dll"
          4⤵
            PID:1644
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1756

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        61KB

        MD5

        e71c8443ae0bc2e282c73faead0a6dd3

        SHA1

        0c110c1b01e68edfacaeae64781a37b1995fa94b

        SHA256

        95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

        SHA512

        b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        05af56a1973775b4441491179e4ee380

        SHA1

        6e15dd1100691915949564740849e161699dc0bf

        SHA256

        368ce468347c7a60dc5aaa4bed384fcdec91c2c54f803084af6e0c640fc5026f

        SHA512

        e3bc8d96276771b83976f5022ef6c09c979d8a8ca25c57c3fe304b9fddbe9b6c41690cb2481e93152f1cf892bd098a0f6ce7c6ae06eb657d25c1e39d0ef1feda

      • C:\Users\Admin\AppData\Local\Temp\014211.tmp

        Filesize

        546.5MB

        MD5

        0e4ed15d4ae77c169ca904606d708f53

        SHA1

        a7ff49d2b4f2a5e645117555749070fd3f7aa92b

        SHA256

        5525a76d5092359bea662190499a6b6a99bccfc5cf837e6dc70a13fe357cb32f

        SHA512

        a00942c8d98a2946bf5015c55376edd430bcb544d115f7ee45726e29365629ec7cdd15664dcc6667d208396356b92390ae987811fc6213b84739b41032fc07e4

      • C:\Users\Admin\AppData\Local\Temp\014221.zip

        Filesize

        840KB

        MD5

        dcc238de3d83b5336dcd22e2776cee5d

        SHA1

        da164733349e2213b5e358daecbc592cafcaff5f

        SHA256

        f606c3a75ef03e20d97785471c182b2f91f7256c2d6dc3feb860353215e1096c

        SHA512

        b0d9a4de35192859ff635b14d1971dc6e00e7a0cf87da64a549c4e0cc079e727e43a32d126562be7e3d0dfab0787812acbf9fedd51ddbc8e4165faa4545b9608

      • C:\Users\Admin\AppData\Local\Temp\Cab5314.tmp

        Filesize

        61KB

        MD5

        fc4666cbca561e864e7fdf883a9e6661

        SHA1

        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

        SHA256

        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

        SHA512

        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

      • C:\Users\Admin\AppData\Local\Temp\Tar54B0.tmp

        Filesize

        161KB

        MD5

        be2bec6e8c5653136d3e72fe53c98aa3

        SHA1

        a8182d6db17c14671c3d5766c72e58d87c0810de

        SHA256

        1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

        SHA512

        0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        96dc748e2c41a9a6c82a72d6415d7519

        SHA1

        17744d22797f4a6d59b8fc096490a16ac7d4f7b3

        SHA256

        6713bc99870f9706fae684e624930eed9d0e8ad4edfc7402be871e0d6ce34e09

        SHA512

        85fd0770c910f52cda306f89e9b982c897e70693149c92f880310e1b084591e8c715a6bb14f93e549c259d0b43f9cd3553b02a812d66fd8c308195610ff8af65

      • \Users\Admin\AppData\Local\Temp\014211.tmp

        Filesize

        546.5MB

        MD5

        0e4ed15d4ae77c169ca904606d708f53

        SHA1

        a7ff49d2b4f2a5e645117555749070fd3f7aa92b

        SHA256

        5525a76d5092359bea662190499a6b6a99bccfc5cf837e6dc70a13fe357cb32f

        SHA512

        a00942c8d98a2946bf5015c55376edd430bcb544d115f7ee45726e29365629ec7cdd15664dcc6667d208396356b92390ae987811fc6213b84739b41032fc07e4

      • \Users\Admin\AppData\Local\Temp\014211.tmp

        Filesize

        546.5MB

        MD5

        0e4ed15d4ae77c169ca904606d708f53

        SHA1

        a7ff49d2b4f2a5e645117555749070fd3f7aa92b

        SHA256

        5525a76d5092359bea662190499a6b6a99bccfc5cf837e6dc70a13fe357cb32f

        SHA512

        a00942c8d98a2946bf5015c55376edd430bcb544d115f7ee45726e29365629ec7cdd15664dcc6667d208396356b92390ae987811fc6213b84739b41032fc07e4

      • memory/848-68-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-82-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/848-67-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-69-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-70-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-72-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-71-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-73-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-74-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-75-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-76-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-78-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-77-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-79-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-80-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-81-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-64-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-83-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-84-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-88-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-111-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-66-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-65-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-63-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-62-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-61-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-801-0x00000000062F0000-0x00000000062F1000-memory.dmp

        Filesize

        4KB

      • memory/848-60-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-59-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-58-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-57-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/848-931-0x00000000062F0000-0x00000000062F1000-memory.dmp

        Filesize

        4KB

      • memory/1476-930-0x00000000002B0000-0x00000000002B1000-memory.dmp

        Filesize

        4KB

      • memory/1644-932-0x0000000001D90000-0x0000000001D91000-memory.dmp

        Filesize

        4KB