Analysis

  • max time kernel
    147s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2023 08:43

General

  • Target

    Untitled_608.doc

  • Size

    530.4MB

  • MD5

    2eb5422601d89dfd4647058ba9870cd2

  • SHA1

    0ebf38a9cf7f301fd4e44f54c6ef0aff85db47dc

  • SHA256

    0dec6da910a6bbf4ac7adfa27c285cec80a243d1ecd61e01b53e12700dd40500

  • SHA512

    67bcc59f6434e4dbb962b628ccf8badadbcb495bd9a0f51ffa5611fb8e9a7b8c68cee5787c5bfec1dd2140dd737a266f59d64d458971e047448283c8dfe974a9

  • SSDEEP

    6144:zZRtBPT4N/uQaNULlPUvauNTklB7ShcbYdFf8UOPv:zZvJhfKd2amwYdKUq

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 4 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Untitled_608.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:468
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\094350.tmp"
        2⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Users\Admin\AppData\Local\Temp\094350.tmp"
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:684
          • C:\Windows\system32\regsvr32.exe
            C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ToUJCU\qxEVnKdX.dll"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1396

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      e71c8443ae0bc2e282c73faead0a6dd3

      SHA1

      0c110c1b01e68edfacaeae64781a37b1995fa94b

      SHA256

      95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

      SHA512

      b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      7c44ad99af96ec9e0b307a0c6bda70a0

      SHA1

      3a2fa3c2a9d54c8b0c63c598f701fd2b1b5d3c2c

      SHA256

      ecfba06eb56a78eb7c7c081107523e8ffd3602af89ad13c87beb25f447d541e9

      SHA512

      31a2d4aba6f74ff51f181a0c5d5d91b90bf25f9efdf6bb59fc5964308084ed078db074c8d81f9dba1819355b5663c75a6701f682efa22276fa3ccbf6c52d53cf

    • C:\Users\Admin\AppData\Local\Temp\094350.tmp

      Filesize

      561KB

      MD5

      c901c8089c5e017f8e9b4b15c8ef154f

      SHA1

      336c2bea43bfa2e8afd27a164dba640f36c0013c

      SHA256

      fd79e8fa5e3801101a1305b6aba7a5e7fdc852ed9036d6d9a5210be414a5cc5a

      SHA512

      9ff052f9fc9cc3cf74b170f76d6a20a01c5dbb74b2d97edc9e55b75f52b408f3104e49bf290773bd63d216f2787d945aa7d954b58e927c99e1db18c6a7d74ade

    • C:\Users\Admin\AppData\Local\Temp\Cab4001.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Tar419D.tmp

      Filesize

      161KB

      MD5

      be2bec6e8c5653136d3e72fe53c98aa3

      SHA1

      a8182d6db17c14671c3d5766c72e58d87c0810de

      SHA256

      1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

      SHA512

      0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      bf4132cadafaacde74a6cf5cbdb318d3

      SHA1

      ed6b8072d4d2165453c407a62ff08b193a7a7fed

      SHA256

      700f2289eadf317312ef8e7f46233914c79ffc09eefc44d760818e1f7a41b80a

      SHA512

      5b13f705e371159a9fceaceb9f22cbc244707720a2667c8784277b54ccb906af9e38e82a6940bec75672d45ff0d2b951a75c9dd35ad843142e7ab23e259b590f

    • \Users\Admin\AppData\Local\Temp\094350.tmp

      Filesize

      561KB

      MD5

      c901c8089c5e017f8e9b4b15c8ef154f

      SHA1

      336c2bea43bfa2e8afd27a164dba640f36c0013c

      SHA256

      fd79e8fa5e3801101a1305b6aba7a5e7fdc852ed9036d6d9a5210be414a5cc5a

      SHA512

      9ff052f9fc9cc3cf74b170f76d6a20a01c5dbb74b2d97edc9e55b75f52b408f3104e49bf290773bd63d216f2787d945aa7d954b58e927c99e1db18c6a7d74ade

    • \Users\Admin\AppData\Local\Temp\094350.tmp

      Filesize

      561KB

      MD5

      c901c8089c5e017f8e9b4b15c8ef154f

      SHA1

      336c2bea43bfa2e8afd27a164dba640f36c0013c

      SHA256

      fd79e8fa5e3801101a1305b6aba7a5e7fdc852ed9036d6d9a5210be414a5cc5a

      SHA512

      9ff052f9fc9cc3cf74b170f76d6a20a01c5dbb74b2d97edc9e55b75f52b408f3104e49bf290773bd63d216f2787d945aa7d954b58e927c99e1db18c6a7d74ade

    • memory/684-1120-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/1088-95-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-123-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-90-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-91-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-92-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-93-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-94-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1088-96-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-97-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-98-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-99-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-100-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-89-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-166-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-178-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-88-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-87-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-86-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-80-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-85-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-84-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-83-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-82-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/1088-81-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB