Analysis
-
max time kernel
30s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-03-2023 14:44
Behavioral task
behavioral1
Sample
untitled_14032023.doc
Resource
win7-20230220-en
General
-
Target
untitled_14032023.doc
-
Size
501.4MB
-
MD5
50eb90f3e451375804fd9d98d6138cdc
-
SHA1
5b1619c3a35724b9ddd6665c49114f16b715dacd
-
SHA256
671860b937257d8c1112283d78357c8c7f4de998dfff62e8a13c7b80f4fe2676
-
SHA512
9d1d9035de7aa01ff612b20c12c12b4aebee9e4941269c6cddcf988acacedc270a288e5e0b5fe5447fb97be46b39776c3fe80e021c709b90d8c3091fae2668a8
-
SSDEEP
6144:5yk1RgZZXbN63GW1Z7krKSUzMNYJJdKkOl950uH54Lg4Ne9C:5/MXJ6WW1Z7ktUgNYJJdKkOHC4D409
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1904 840 regsvr32.exe 25 -
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 840 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 840 WINWORD.EXE 840 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 840 WINWORD.EXE 840 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 2008 840 WINWORD.EXE 26 PID 840 wrote to memory of 2008 840 WINWORD.EXE 26 PID 840 wrote to memory of 2008 840 WINWORD.EXE 26 PID 840 wrote to memory of 2008 840 WINWORD.EXE 26
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\untitled_14032023.doc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2008
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\144510.tmp"2⤵
- Process spawned unexpected child process
PID:1904 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\144510.tmp"3⤵PID:308
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\ItleDRdRABniKHoyl\WeOVe.dll"4⤵PID:1576
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
438.4MB
MD5560d8a1ae3b7422076e1fa274622c1b7
SHA1bda06893f77d37244b294fb006a1ef73d5dda89d
SHA2562381fbc3c60fd93c867cf66ae33cefd39122f16b16faaa9369fbc1bc36254300
SHA51253175675f39586f9029e6c81b628cb8c6a5e841c729e65ab0fd7497979faa099ee585db8c970cf83df80d03d927ad9a8466b9e9cdf14d77a1124cdb7f0cd7c81
-
Filesize
840KB
MD59d981a69aabf1188886040d54fb4aa9b
SHA1ffc01610fa628cc6ca68d7eb42f9f6b6cbb3e033
SHA256741ba2304437d0197941620fc6fc5ceb03e5661e463aa7a634f0c1a814216047
SHA512d3aa46a8edc40099171454e2647d78dc89cc987111216ee388d864edbfe34275beb205498f52bf2b54cec77041b98c16734544c5d853045990c9367eb955dc4d
-
Filesize
20KB
MD5a0fb82fb3afefb4266f27d59d1345e5a
SHA1af7cf50bb123831dee7742a4c9318f25d8002251
SHA256da933b0ffc12f5c4e0768a4f812fafa38f5aefaf665a1970ee73895de38e5e57
SHA51274b2f3428f635d144c71103f1160f5759d69a4052908bed6a8a80a16deecd84ccdb108fa5921c5c9fedcea02e11f1385a15de435558ca59312919b7685ac389e
-
Filesize
460.8MB
MD56ba58c5cdcb10058af40aa9744549f55
SHA1408f69cf078f959bda5c6f78849eb088d6bcfff0
SHA256c65da8e88276463620e29c532c58a951ac12b6ca93005c3b076cea1d618f5bbf
SHA512443978d51638d22b0735fc81bd019cde806eb8d4a8f0c7a63ad5acadca15f7136d278f1b6ad6ac20d3f231f3fca9fa0dbc4a70d3b94532f3f1cb5d454636a554
-
Filesize
486.2MB
MD59c5f59dfe19e568abdcfaa2e12202425
SHA16672571899232587386dab20235b7b7591454bd2
SHA25624dec74f8bc2124672d4f4f523bc5a9d6b75b142c378f5447582d0de778fadee
SHA512c49cde3e41ccdbb34f0c584653e57c739e3e4bcebbd788f9239076bf163af895e430814c3c6e4f8f720c8a53bb2557a65a498b24936a63962d84ecfda1cd4299