Analysis
-
max time kernel
31s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-03-2023 01:12
Behavioral task
behavioral1
Sample
Opast International.doc
Resource
win7-20230220-en
General
-
Target
Opast International.doc
-
Size
507.3MB
-
MD5
d6bd3571da478170da80bf363a0a3cc1
-
SHA1
82354b12002d0af54a41569d9b056dee6485c220
-
SHA256
c9a0e9945939f2399702491faba916cda43a96749b45c4ad75a94a32dd558ae1
-
SHA512
a8fb1316a67cd225d4caece153e60e90975ab9aeda82da2cd0ec28f997e5aaec187af962881c796ecaac0744406dcdf40c75adc02757b3c3f5c2d7c04576f834
-
SSDEEP
6144:QDuxuMOZCBtANveapnaWVgsaNlbfXhoEHC87pnkTnlzIWZ4:18yGZZak8fxJB1e5IWZ4
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1380 1984 regsvr32.exe WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1984 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
WINWORD.EXEpid process 1984 WINWORD.EXE 1984 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1984 WINWORD.EXE 1984 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Opast International.doc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\011335.tmp"2⤵
- Process spawned unexpected child process
PID:1380 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\011335.tmp"3⤵PID:964
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\MrkAfk\LTxubTiojkSI.dll"4⤵PID:1188
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270.4MB
MD5e8710885a4a0698493c390658d2db87f
SHA11836dbffe7830d560d1672f82922a1b8e39ba3df
SHA256fe52ac0e16d58258e4ffc9b2ed49511af5f81d41acaa69655feca57da8b57278
SHA51224d5c1092aa6c07c1005040b8d4bd5df3030bfe73c018f2c4feaa7c52e554ad8224b56f6b1fa289d7b914925af1af66d4a817b77a27c868986650f3be33069db
-
Filesize
804KB
MD57821adc2f937cd7f7f6fc3499ceda7c3
SHA15e4c4bd7a474c4bebe39b3741ccbc54e524692d4
SHA25695944d22d1e39c3d3f1b7f35fc225b81fd937d711a662b219fa94422e78c8f17
SHA512f850146e6bd3a1a43da0f01db570c8881642aabf3a315db429a1bb2834cfe7baed183f575cd3774948ef5cd485f7a042d580dbb48f77f47a081e967273bb85cb
-
Filesize
20KB
MD5033cdd152a14212a10387601ae7fad46
SHA1295a79628846d03c04d73c0ff84688ae04bf88cb
SHA2561da6a133a35a7b6089bb6e34a0e81ec2d2a182ca64d7a7bf1a8257c76b43caf2
SHA512c404587b30e67d525e03632c99666e6376fa3bf72d051b097231abe7347978b340dfa5505f812b21ef97046efbfc465eacbe0d20b9d4b1f927b574f0711c64cd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
254.6MB
MD5f443af86d59c842840d65fadec67ee10
SHA1bf16455f74f85ad19f116a2cc974d221c9a7e43b
SHA2560dba4a7a0f1ab6d26ddfccb70ffb81fff72751c1f7e6b24fd43a8e05655b543f
SHA51261a3f04d339a70de7139499b58f247048ae3f5b8b9008c71effae141d833dbd6fa083ef47839511c28513ed42a3d2fc5d1c11c3c7fefbe3a648ee1780b9e4663
-
Filesize
276.4MB
MD570835e1e59a4e6826108349bc1418b5c
SHA15d2d06f269ce37e600c3f9b71a62f0b401e9bc7a
SHA2566925c891b3597c34e0248a7267b58234b199954d2751224e7bdecdc4ac94a526
SHA5122e99a428803156a18c13d7c51299c2fb90201e61b3dfe493c7b76657d09034ae0c2a465c9a0cad871394ddb29a1bb7f3bfd7c88f5633606062826a52699c6bf9