Analysis

  • max time kernel
    107s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-03-2023 11:25

General

  • Target

    MES_1.doc

  • Size

    506.4MB

  • MD5

    713e53be7f6f3ed6c57ef1e8372f543a

  • SHA1

    7b72268716d7aa469e765706806b5be022a71a4d

  • SHA256

    526d008cb8bff20d9c8a55678536185cd303f9c9444e8196df40c158bf158658

  • SHA512

    c02578e3cdf9a8470150e7af8cfd9380efad972cf00613ca1c7eee56e38263fd881758d722f1540cb64465e8ae09859b136047320fd3af6d98c87e16311042d7

  • SSDEEP

    6144:5yk1RgZZXbN63GW1Z7krKSUzMNYJJdKkOl950uH54Lg4Ne9C:5/MXJ6WW1Z7ktUgNYJJdKkOHC4D409

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\MES_1.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:436
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\122641.tmp"
        2⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1772
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Users\Admin\AppData\Local\Temp\122641.tmp"
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1784
          • C:\Windows\system32\regsvr32.exe
            C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PBtSuFPZcGai\WBSjh.dll"
            4⤵
              PID:1344

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\122641.tmp
        Filesize

        525.5MB

        MD5

        df50e36ecd16b92b826a976e10c3f66a

        SHA1

        2075e450d4e729079470ae498d3c1feb5713ad71

        SHA256

        cb396627301fad9eb5e7a69a72c9fed15031d962b03c3bcf255658ae2494e9c7

        SHA512

        3d421e444b9963deb4157cf60d7b1f5ae17fa759b17581d5452e6ba91b62287457a84c8e3c75cbe21bd76c6b0cb60b2eb922ccc06dfbb11575c4ba8ece9e4ff2

      • C:\Users\Admin\AppData\Local\Temp\122647.zip
        Filesize

        832KB

        MD5

        37c2afe8216d24f34b43afd2a7194b55

        SHA1

        808b527723a7b6ca6fabc7b271607b8873e219af

        SHA256

        af6425ecb20ddb50368410943efd644ebcf94dddf5a3fdc8f8195e9284e0769a

        SHA512

        7d1b2cba1c5a69c586451a72829866e078ff6ccee9287b072a855e29f9cf25a51261d8baa6441cfc89d09b61f330c243f620044323d5bd48b360043e9c214279

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        521a8a7ecb68e393d3200a4447e71e61

        SHA1

        f2a46916e5fa2c14825c2567e3af2c054d59fac3

        SHA256

        2261edfd7b67046338305e9b8e326e7b507e75530b97bdd6792931e2ba170282

        SHA512

        abc3f1aa7b45a4ba2c4a912f5f9e8402a0b85dfc9c89a662e404e2afd0aeadb984e5a847a797063a81c8be607f36b1f38baf0e6273398642dde9535d939b1ba9

      • \Users\Admin\AppData\Local\Temp\122641.tmp
        Filesize

        525.5MB

        MD5

        df50e36ecd16b92b826a976e10c3f66a

        SHA1

        2075e450d4e729079470ae498d3c1feb5713ad71

        SHA256

        cb396627301fad9eb5e7a69a72c9fed15031d962b03c3bcf255658ae2494e9c7

        SHA512

        3d421e444b9963deb4157cf60d7b1f5ae17fa759b17581d5452e6ba91b62287457a84c8e3c75cbe21bd76c6b0cb60b2eb922ccc06dfbb11575c4ba8ece9e4ff2

      • \Users\Admin\AppData\Local\Temp\122641.tmp
        Filesize

        525.5MB

        MD5

        df50e36ecd16b92b826a976e10c3f66a

        SHA1

        2075e450d4e729079470ae498d3c1feb5713ad71

        SHA256

        cb396627301fad9eb5e7a69a72c9fed15031d962b03c3bcf255658ae2494e9c7

        SHA512

        3d421e444b9963deb4157cf60d7b1f5ae17fa759b17581d5452e6ba91b62287457a84c8e3c75cbe21bd76c6b0cb60b2eb922ccc06dfbb11575c4ba8ece9e4ff2

      • memory/316-86-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-71-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-60-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-61-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-62-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-90-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-64-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-65-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-66-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-67-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-68-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-69-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-70-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-91-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-72-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-73-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-74-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-75-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-76-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-77-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-78-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-79-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-80-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-81-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-82-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-93-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-84-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-87-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-85-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-58-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-88-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-89-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-63-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-59-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-83-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-92-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-94-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-95-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-96-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-97-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-98-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-99-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-100-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-101-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-102-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-103-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-104-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-105-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-106-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-109-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-108-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-107-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-110-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-111-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-112-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-113-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-114-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-115-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-116-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-117-0x0000000000750000-0x0000000000850000-memory.dmp
        Filesize

        1024KB

      • memory/316-1486-0x0000000006A80000-0x0000000006A81000-memory.dmp
        Filesize

        4KB

      • memory/316-1744-0x0000000006A80000-0x0000000006A81000-memory.dmp
        Filesize

        4KB

      • memory/316-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1344-1745-0x0000000000200000-0x0000000000201000-memory.dmp
        Filesize

        4KB

      • memory/1784-1739-0x0000000000130000-0x0000000000131000-memory.dmp
        Filesize

        4KB