Analysis

  • max time kernel
    111s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17-03-2023 07:54

General

  • Target

    OMICS Online.doc

  • Size

    543.3MB

  • MD5

    7eb84a7a3fb18a7551c1e1388842a397

  • SHA1

    5ff9cde3b87283178b9936ee89340c7737b90cbc

  • SHA256

    55a0bb97b9a14e5e0f32765f475aa5288731689ceef380ead22de9efde9dece4

  • SHA512

    5811397517d7783c35709f89eb30a82ade4e1ef305f8fad8ec9829bb11f64e9565ebc50f6ef183b2b41882e2a1ef4518901a5e1097025461907dfa3d56a601c4

  • SSDEEP

    6144:1620tqUx3Xu+7ZkRIDNGi9a0Va5UAClo:1620tqm3+I2ezcz5U3lo

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\OMICS Online.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\085453.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:272
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\085453.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:108
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BNYayzjdyQlJ\WkdcvZmAgZsHm.dll"
          4⤵
            PID:240
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1152

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        61KB

        MD5

        e71c8443ae0bc2e282c73faead0a6dd3

        SHA1

        0c110c1b01e68edfacaeae64781a37b1995fa94b

        SHA256

        95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

        SHA512

        b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        d9d39ccfb39b7619309c1a7f9bfea972

        SHA1

        a2f878eee450a188c38e3a1571f688920d135cd4

        SHA256

        521e6da412f4a648b1b8aab3c425a708fdb61da1f9d2caeb7f1b32a772b3a841

        SHA512

        60f5387f32b6126aa95fed8a4dc8e6d763a0a959f79cf009594e61d471e8b4f3c5b8173b27e32c6f4bd60f0b6d0afc79bc5002ffc1e1bf91af6c5172547a43b0

      • C:\Users\Admin\AppData\Local\Temp\085453.tmp
        Filesize

        544.5MB

        MD5

        882bfa5b44b10fa19af8d5b4ffa2eedc

        SHA1

        a8b4e1ef0d568ed143ed0e03899f27ebb762483c

        SHA256

        278c048a35b95d957edc4bc0437c873b942a3cafd1cc13bba086b013dbf3f172

        SHA512

        2808899119b96e9ab5cf1706b276d2b7406542ec390e3caa41cef7ec12af1b25c26d82a55d9e5fad21dc6168db1fa49823d63fe8ff64485c14f5c804eed30b4c

      • C:\Users\Admin\AppData\Local\Temp\085502.zip
        Filesize

        850KB

        MD5

        9f4329b923d7487a36e68da309725535

        SHA1

        6bd7b78fc7abf92cbd22560e18846be81243368d

        SHA256

        aa90e9a1489fd92f66829cd6eadfd37a6bee2ce2ba35e56e88defa8f13ca71a3

        SHA512

        d0138a95d5fa844c730c26aa7e5430e0d72ee64f91cde3a5d10d00f43656c602d6d10f490931c22634fcb7b8d5459760faea0931d78de554628c7f001d35d03d

      • C:\Users\Admin\AppData\Local\Temp\Cab4648.tmp
        Filesize

        61KB

        MD5

        fc4666cbca561e864e7fdf883a9e6661

        SHA1

        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

        SHA256

        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

        SHA512

        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

      • C:\Users\Admin\AppData\Local\Temp\Tar47F4.tmp
        Filesize

        161KB

        MD5

        be2bec6e8c5653136d3e72fe53c98aa3

        SHA1

        a8182d6db17c14671c3d5766c72e58d87c0810de

        SHA256

        1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

        SHA512

        0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        d8bb21f87180a6e01c50ab79f2b0b641

        SHA1

        a59f24321b504698cc779bbe355eadc416e007f2

        SHA256

        d4d75a02920b5653458ec0e0e7f09936e16c5b1e1df4b793f3495229b4492d66

        SHA512

        77a5d52ee9cce7288db41f57c4fc2e7a76d12f18f304f90a6c70188c314cf5ffdd79fa59240c9c11ab042c767b377fb7cd3312753e92db902b8182387e0bd348

      • \Users\Admin\AppData\Local\Temp\085453.tmp
        Filesize

        544.5MB

        MD5

        882bfa5b44b10fa19af8d5b4ffa2eedc

        SHA1

        a8b4e1ef0d568ed143ed0e03899f27ebb762483c

        SHA256

        278c048a35b95d957edc4bc0437c873b942a3cafd1cc13bba086b013dbf3f172

        SHA512

        2808899119b96e9ab5cf1706b276d2b7406542ec390e3caa41cef7ec12af1b25c26d82a55d9e5fad21dc6168db1fa49823d63fe8ff64485c14f5c804eed30b4c

      • \Users\Admin\AppData\Local\Temp\085453.tmp
        Filesize

        544.5MB

        MD5

        882bfa5b44b10fa19af8d5b4ffa2eedc

        SHA1

        a8b4e1ef0d568ed143ed0e03899f27ebb762483c

        SHA256

        278c048a35b95d957edc4bc0437c873b942a3cafd1cc13bba086b013dbf3f172

        SHA512

        2808899119b96e9ab5cf1706b276d2b7406542ec390e3caa41cef7ec12af1b25c26d82a55d9e5fad21dc6168db1fa49823d63fe8ff64485c14f5c804eed30b4c

      • memory/108-1412-0x00000000003A0000-0x00000000003A1000-memory.dmp
        Filesize

        4KB

      • memory/240-1413-0x00000000003F0000-0x00000000003F1000-memory.dmp
        Filesize

        4KB

      • memory/1708-1215-0x00000000062B0000-0x00000000062B1000-memory.dmp
        Filesize

        4KB

      • memory/1708-618-0x0000000005980000-0x0000000005A80000-memory.dmp
        Filesize

        1024KB

      • memory/1708-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1708-1418-0x00000000062B0000-0x00000000062B1000-memory.dmp
        Filesize

        4KB

      • memory/1708-573-0x0000000005980000-0x0000000005A80000-memory.dmp
        Filesize

        1024KB