Analysis

  • max time kernel
    112s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2023 09:59

General

  • Target

    Example.co.doc

  • Size

    226KB

  • MD5

    22edd303f28f432bf8f89ec959819ae8

  • SHA1

    3b25e29328339c5a2eef8d3140015ff47fe541c1

  • SHA256

    56387ffecce60cba738357c8c265b02eeabf088449f7d2904fcadb84cba79450

  • SHA512

    0cb8241ec4e9eb8476d082f9fd2a28dfc0b60e544b4cd5eab6f8696caa94a5060d97c1894bf228f7b21feaf5aa568513ee0fd46f2e1dd4914f4076384862c103

  • SSDEEP

    3072:brrCtKZF4eqZ627NHRxMvOwvzpl+vk6jZc:5F4eqYwHMvfvzpKk6Nc

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 4 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Example.co.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\110002.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\110002.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RAApWqyrrRVxK\cVOZXnyXzVjM.dll"
          4⤵
            PID:2036
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1780

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        61KB

        MD5

        e71c8443ae0bc2e282c73faead0a6dd3

        SHA1

        0c110c1b01e68edfacaeae64781a37b1995fa94b

        SHA256

        95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

        SHA512

        b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        03e635bcea1757d387b986a218abcdc5

        SHA1

        ba4afde886b4430350ddc22088cda40bda2aa7a3

        SHA256

        1a5f145cdaafd96ec769112d94c84321fd989bc655006e2c0cc72d06a54cc071

        SHA512

        6a825ae60973d9091d04274e082aef0cb3f4dee02ede952885ddfac4341796714d8495f7788736252082c4ff461ce2ccd2c68656545a6dc6183273ba232fc102

      • C:\Users\Admin\AppData\Local\Temp\110002.tmp
        Filesize

        522.9MB

        MD5

        f2628c5dce23002e36de9ef4868dd355

        SHA1

        68ed54d8f41846e4ae6aa307db273a78366b19b2

        SHA256

        439ea1f948d9fe110f5d72c5adf2cd96843bfef8214351f733f8ed92afefc24e

        SHA512

        760fddc7777cc34432ba43768483342d6954ae3e6b013b06fc2f6bbac508bafd3a6517a490f5a642514d559d496f77a98c84542851e17ad8e3b8e17c16f51083

      • C:\Users\Admin\AppData\Local\Temp\110014.zip
        Filesize

        962KB

        MD5

        facbee8335997018721773ddc6bc1e5d

        SHA1

        e1016d9024c04f8cbb796df87b484dd05592e10b

        SHA256

        b2e1b0128f1ed95eff9a9786a380976f2477cd3a916f1074f622840318d3654a

        SHA512

        821c8f16567eba7578b519ed4ad55daf60c0702472cbe3db6b59fdf4cc77038a3121e7db8001efb7091d1701e4245d22306390440b58449dc7fa45472d0b4dba

      • C:\Users\Admin\AppData\Local\Temp\Cab33E0.tmp
        Filesize

        61KB

        MD5

        fc4666cbca561e864e7fdf883a9e6661

        SHA1

        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

        SHA256

        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

        SHA512

        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

      • C:\Users\Admin\AppData\Local\Temp\Tar3F5C.tmp
        Filesize

        161KB

        MD5

        be2bec6e8c5653136d3e72fe53c98aa3

        SHA1

        a8182d6db17c14671c3d5766c72e58d87c0810de

        SHA256

        1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

        SHA512

        0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        7b3636d42a1f9b6d4d0585855f3d5668

        SHA1

        910b217c41555f50533d480769dd1366fd609309

        SHA256

        9a55b5a9ae0f9638c5ae02f7d0cd73a9b5aa81f603a4b0fcb707571c230b70fc

        SHA512

        7abe879fb17d307d445c2d8632bee899f1d03ae4f00e482b7603d1a9ad2975c93ab7980ecfd1ff6fef7b2a86fc3b8fd6f6b064c3b3130fe8f3e972d07ad98419

      • \Users\Admin\AppData\Local\Temp\110002.tmp
        Filesize

        522.9MB

        MD5

        f2628c5dce23002e36de9ef4868dd355

        SHA1

        68ed54d8f41846e4ae6aa307db273a78366b19b2

        SHA256

        439ea1f948d9fe110f5d72c5adf2cd96843bfef8214351f733f8ed92afefc24e

        SHA512

        760fddc7777cc34432ba43768483342d6954ae3e6b013b06fc2f6bbac508bafd3a6517a490f5a642514d559d496f77a98c84542851e17ad8e3b8e17c16f51083

      • \Users\Admin\AppData\Local\Temp\110002.tmp
        Filesize

        522.9MB

        MD5

        f2628c5dce23002e36de9ef4868dd355

        SHA1

        68ed54d8f41846e4ae6aa307db273a78366b19b2

        SHA256

        439ea1f948d9fe110f5d72c5adf2cd96843bfef8214351f733f8ed92afefc24e

        SHA512

        760fddc7777cc34432ba43768483342d6954ae3e6b013b06fc2f6bbac508bafd3a6517a490f5a642514d559d496f77a98c84542851e17ad8e3b8e17c16f51083

      • memory/1800-912-0x00000000001B0000-0x00000000001B1000-memory.dmp
        Filesize

        4KB

      • memory/2016-66-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-73-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-69-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-70-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-71-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-72-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-74-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-75-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-76-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-77-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-79-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-80-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-81-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-78-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-82-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-68-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-67-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-83-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-84-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-111-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/2016-65-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-63-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-64-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-61-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-62-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-60-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-59-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-58-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2016-57-0x0000000000480000-0x0000000000580000-memory.dmp
        Filesize

        1024KB

      • memory/2036-913-0x00000000002F0000-0x00000000002F1000-memory.dmp
        Filesize

        4KB