Analysis

  • max time kernel
    122s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-03-2023 23:06

General

  • Target

    Kk-echo.doc

  • Size

    207KB

  • MD5

    e2b2e81d94600338e279924278a3e0c4

  • SHA1

    1ea91cf8ae8087f1c81c012a4346fc8079720a3e

  • SHA256

    a14a4a807c275b98eff724f72358fcac4790d9bad735667efb271ad339fcddac

  • SHA512

    f4ce8868b3cf604b78ccb6c9bcf00ba2078d63272aab6d327e78df2e19fb533c436df9b6f9437cde0a4a62ef6eeed966f6a56c7803c2f603642c750c6aebc47c

  • SSDEEP

    3072:qjaqgJKlkOLyO1k7df0r56kgJOpI8wffI/0GQFrjhfcl4kbo:q7kOLd1k7df0rMkgJb8wfg/Wrebbo

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Kk-echo.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\000703.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\000703.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JzQmoeigszUP\UPONRSlvSvqY.dll"
          4⤵
            PID:1720
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1300

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\000703.tmp
        Filesize

        521.9MB

        MD5

        853b6005de754974d71396271700bf31

        SHA1

        1cba641c88048110c024c13c2da9af6d551cd1da

        SHA256

        5a5e279c4a1af85bc0708b92c7a1b774e8a9e065e14ab4a14bffb8fa8c2de27b

        SHA512

        aaa8eaf7cae81bd4179c053105612037afd9626d3b7b4f73bd0040502571b42e057d900f94cef7e1f968e576eea9b56101b92628ad903055299906c46d2277ac

      • C:\Users\Admin\AppData\Local\Temp\000706.zip
        Filesize

        961KB

        MD5

        ac4f4455a8969a9cd590b93beedeb809

        SHA1

        17ea0e7f43ca82575a1fd99e9302de7606f23a8a

        SHA256

        4650153b81b87beaed3e5f7cf2208afbdc3e1198e5bf005e57e98188e1aa5a49

        SHA512

        4f87154f9c76440c2df9700f51ec6d9a205b18f79c45cfcdd678e7864aaf9de3125a35e10dabb24f788bec2c9f891c306cc37924bf19e34c62f9b17f210c9431

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        578deb9dc88f82cf72c95bbffffc5c63

        SHA1

        92d6361d9ad8a6db9e61a2f08e89a8392e8eb369

        SHA256

        23b7b1ec2e59f4814e4521dabf8839c667bc52d2e1b255aa269deb5127b23ba8

        SHA512

        3563bd0e89ce7a84be875f2c7658c7ab34a48bbc8afe255464c6800889d5ed893ab64bb4a5cea61234dbfbac1fad56e0cf074ef87814574a006c462555ad1e3f

      • \Users\Admin\AppData\Local\Temp\000703.tmp
        Filesize

        521.9MB

        MD5

        853b6005de754974d71396271700bf31

        SHA1

        1cba641c88048110c024c13c2da9af6d551cd1da

        SHA256

        5a5e279c4a1af85bc0708b92c7a1b774e8a9e065e14ab4a14bffb8fa8c2de27b

        SHA512

        aaa8eaf7cae81bd4179c053105612037afd9626d3b7b4f73bd0040502571b42e057d900f94cef7e1f968e576eea9b56101b92628ad903055299906c46d2277ac

      • \Users\Admin\AppData\Local\Temp\000703.tmp
        Filesize

        521.9MB

        MD5

        853b6005de754974d71396271700bf31

        SHA1

        1cba641c88048110c024c13c2da9af6d551cd1da

        SHA256

        5a5e279c4a1af85bc0708b92c7a1b774e8a9e065e14ab4a14bffb8fa8c2de27b

        SHA512

        aaa8eaf7cae81bd4179c053105612037afd9626d3b7b4f73bd0040502571b42e057d900f94cef7e1f968e576eea9b56101b92628ad903055299906c46d2277ac

      • memory/1720-847-0x0000000000180000-0x0000000000181000-memory.dmp
        Filesize

        4KB

      • memory/1780-842-0x00000000000C0000-0x00000000000C1000-memory.dmp
        Filesize

        4KB

      • memory/2016-79-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-81-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-66-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-69-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-70-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-72-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-73-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-74-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-75-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-76-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-77-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/2016-82-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-80-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-83-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-65-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-78-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-71-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-68-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-84-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-67-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-85-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-58-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-111-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-64-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-63-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-62-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-60-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-61-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-59-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB

      • memory/2016-57-0x0000000000600000-0x0000000000700000-memory.dmp
        Filesize

        1024KB