Analysis

  • max time kernel
    112s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2023 07:30

General

  • Target

    26651877134168, United Kingdom.doc

  • Size

    500.3MB

  • MD5

    04167b66dad818acca25dd5c5a177e8b

  • SHA1

    638734594d243a9627ab8c16f867a7d0f741c75c

  • SHA256

    ea55eac0221c35e657fdca5d6f893053a296ea678d0a44d9ac2112f5a88ceaa7

  • SHA512

    61688bdcda4c92a9f24320e1eeaaaeefd8d57359f3b46c61194f60fb3cb9cac2878cb25a45b750a988a4b6be6709189273871d8a37dc7acb23eaffb91313644a

  • SSDEEP

    3072:2JX29m8QBUoItA/leC6gSJ+2JiclnUOvrRxqmLcHeNJxPkdVdTRcDK6:2EmleC6gSJWclU0RxVLcHe5cdTR

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\26651877134168, United Kingdom.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\083340.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:732
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\083340.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:768
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VxZgBedvDSG\IUprnNTriqGvoko.dll"
          4⤵
            PID:936
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1628

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\083340.tmp

        Filesize

        527.5MB

        MD5

        d4d306a6d9d1ae637e0cfacf04f7431a

        SHA1

        68b7fb0aa0d65569aa62937620f58a50bd3e9fdd

        SHA256

        a6e1b44ccb61a67b8e16ddc67eccacdd4b9b31a9de1fd048793c5c46b22337e2

        SHA512

        d473a2c746eba2b0add8252f5d44eca39b5a862978de80bc8e0d83f3adfee4601f21bcba3f63caa4fda02fc4c79cae704ac0905f4c938af8abbc2381332f682c

      • C:\Users\Admin\AppData\Local\Temp\083345.zip

        Filesize

        821KB

        MD5

        f1ec7bd22e219fdb389f5e2a0a8132df

        SHA1

        fe8cf0aa2da1a147024c82ac45989795e5b467e0

        SHA256

        8582757782e4048ba84898de0953c7c9710d84c2e764d1fca8b1d393c436dbc8

        SHA512

        2b77027da8f0811f7cfc3735e579c4fd7e3506d85fa78ad667e88bd43dc0ab376d2b8b0c6aab3d35678810a9ee6e589b93d60aa481239ad3acf91cadc88f4969

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        a924e9fcc0d6f658355fdb62fb43498d

        SHA1

        3452e61f3add732f52890cd6ef16433c8d259ecc

        SHA256

        584a5db1e275fb49bdcc5f55849b98cb1d85197cd37934b5df385810f854ba79

        SHA512

        2c73dacb1e464c90fb392fa79e867657738981c947ade8e3b7b5f3a821c5abfba2653cd4e1e7483278e220f0eef5c49c131d33e23c9f8739792001bfc917d84d

      • \Users\Admin\AppData\Local\Temp\083340.tmp

        Filesize

        527.5MB

        MD5

        d4d306a6d9d1ae637e0cfacf04f7431a

        SHA1

        68b7fb0aa0d65569aa62937620f58a50bd3e9fdd

        SHA256

        a6e1b44ccb61a67b8e16ddc67eccacdd4b9b31a9de1fd048793c5c46b22337e2

        SHA512

        d473a2c746eba2b0add8252f5d44eca39b5a862978de80bc8e0d83f3adfee4601f21bcba3f63caa4fda02fc4c79cae704ac0905f4c938af8abbc2381332f682c

      • \Users\Admin\AppData\Local\Temp\083340.tmp

        Filesize

        527.5MB

        MD5

        d4d306a6d9d1ae637e0cfacf04f7431a

        SHA1

        68b7fb0aa0d65569aa62937620f58a50bd3e9fdd

        SHA256

        a6e1b44ccb61a67b8e16ddc67eccacdd4b9b31a9de1fd048793c5c46b22337e2

        SHA512

        d473a2c746eba2b0add8252f5d44eca39b5a862978de80bc8e0d83f3adfee4601f21bcba3f63caa4fda02fc4c79cae704ac0905f4c938af8abbc2381332f682c

      • memory/768-1766-0x0000000000130000-0x0000000000131000-memory.dmp

        Filesize

        4KB

      • memory/936-1771-0x0000000001DD0000-0x0000000001DD1000-memory.dmp

        Filesize

        4KB

      • memory/2012-107-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-112-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-87-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-89-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-91-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-93-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-94-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-95-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-96-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-97-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-98-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-99-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-101-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-102-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-104-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-105-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-106-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2012-109-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-111-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-110-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-88-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-114-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-115-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-113-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-108-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-103-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-100-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-92-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-90-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-85-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-116-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-139-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-86-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-1509-0x0000000006100000-0x0000000006101000-memory.dmp

        Filesize

        4KB

      • memory/2012-81-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-84-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-83-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-82-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-80-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/2012-1772-0x0000000006100000-0x0000000006101000-memory.dmp

        Filesize

        4KB

      • memory/2012-79-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB