Resubmissions

13-03-2023 08:48

230313-kqgpeabe5y 8

13-03-2023 08:44

230313-knl64she29 10

11-03-2023 03:29

230311-d16mysgd22 8

11-03-2023 03:21

230311-dwbl1sab2y 8

Analysis

  • max time kernel
    17s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2023 08:44

General

  • Target

    Nuovo documento 2023.03.10.doc

  • Size

    518.3MB

  • MD5

    7b10cc4d02d11262ff3a0827e1ca926f

  • SHA1

    4178ad78b1891dedc2e50d7fbc03f879b345c1d2

  • SHA256

    d3a1c1342a4b6645ede22de755a41b30bc1720863c6f9905cb4aad0dd7492805

  • SHA512

    93832bb4c8737fd4bfab70224019c68833881cb79ec0ca3dee6dd993ea596d345962b63b87d20944f166c52747ba9f55100c9086d80241df6fdd166fa2186808

  • SSDEEP

    6144:jkmCUX1RauEA55axdWFyDDIqqmbwbLUW:omC7uz552AFZqXbwbA

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Nuovo documento 2023.03.10.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1528
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\094601.tmp"
      2⤵
      • Process spawned unexpected child process
      PID:1420
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\094601.tmp"
        3⤵
          PID:1716
          • C:\Windows\system32\regsvr32.exe
            C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JAkVLNqE\FRwGuwkvVQv.dll"
            4⤵
              PID:1920
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          2⤵
            PID:1780

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\094601.tmp

          Filesize

          322.8MB

          MD5

          6457a9192ea50053d9df61aad7d2e4c4

          SHA1

          f6d5225818a4918fcb5cc25e71e8559c2a4a2de5

          SHA256

          5a2a1b5a9134ab2a390b5a9b559d50725b642ceee17efd3f1fdde6d36dae3a0d

          SHA512

          aa8da924a61efe28dd917df26e451811243ed0c2ed2130ddf936ecaf393c17ecdc52263bba8816106c67b1b1c83c35b753b1314889612ef3300042b271830960

        • C:\Users\Admin\AppData\Local\Temp\094603.zip

          Filesize

          809KB

          MD5

          f780db732dafe3aea7bec6e5b1915dc5

          SHA1

          a388e7954f76557d5edf4b8315d669fd2e4e7e8c

          SHA256

          14ee7bb38b78d00530df973d039d0c0586c4fd83e890e0cb63761f4b5baed11d

          SHA512

          6cc273cf52d6cc767dfa05b6408053ffa695abdaa42684d1fd196e3e43aca9b1395b5954266a8601f34cd52c5d7e559f0bad65dea2b5ac4ea17adf6ce1793f4c

        • \Users\Admin\AppData\Local\Temp\094601.tmp

          Filesize

          319.7MB

          MD5

          2a41f1fd013244e6b308c559379878b7

          SHA1

          fe43aae7709ded06386b7c3256dbee9b60c90180

          SHA256

          b5395c8cf6abcaedad2cf336b17fb113fcfbf569b571a2a28628d842ad28c001

          SHA512

          9d28bb417a406358e1b65b2d8b7f7bf713e08c741269e9370ec674c11f9bdd0d4e5a3072074009cc04e82267c9ae10c5d86d51fcb1c2aedd650e59455754e6e9

        • \Users\Admin\AppData\Local\Temp\094601.tmp

          Filesize

          234.8MB

          MD5

          a2a037aeb6d43dfba5a3b62559cefe52

          SHA1

          f5c684ac536a0139d7ebe801d466e9e8e5954bb4

          SHA256

          e603e6aa598f49912cb59a508be61f1d51751aaf349f28a043d5545de1fb6c8d

          SHA512

          4213c85fe421a8201ba33be1ce77a8f6e8ed0b9cb9703e8b96f8deabf80a15e37fa6d94381f8260962dc3b047a102cff4c455e068932670ce5df1d6fff4c0b59

        • memory/1528-96-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-99-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-79-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-86-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-85-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-89-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-90-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-88-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-87-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-91-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-93-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-92-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-94-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-95-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1528-97-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-98-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-80-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-100-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-101-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-103-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-102-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-104-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-105-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-128-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-177-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-81-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-1245-0x0000000006060000-0x0000000006061000-memory.dmp

          Filesize

          4KB

        • memory/1528-82-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-84-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-83-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1528-1463-0x0000000006060000-0x0000000006061000-memory.dmp

          Filesize

          4KB

        • memory/1716-1458-0x00000000002B0000-0x00000000002B1000-memory.dmp

          Filesize

          4KB