Analysis

  • max time kernel
    116s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2023 16:15

General

  • Target

    Sogawaluggage.co.doc

  • Size

    279KB

  • MD5

    bbe88ae0611387f29af2651582441e72

  • SHA1

    10997a9f041aa7f8beb75c80db1bc3c092793567

  • SHA256

    ce13efb65d134aae87b36ae9433d5f51e50bffe024cf80c9c4e0bfba6491ef5d

  • SHA512

    22a710b1b47bdfd073737d45950c6c30059273d8c47e0b926c06f6a81e8154032727392c66e695eb2b2534a33f0829aa53f8e1269f86f63a8a102abd70590564

  • SSDEEP

    3072:JPO2nw8TvYbnIrmOPYPMbZEg+wVlDz6dOK3PtoQnRhPrr2ZswO/ON1:hOlW0oREwD/yPtPRhPrUs3U

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Sogawaluggage.co.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\171515.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\171515.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UKoaPWiToq\SRoWoDw.dll"
          4⤵
            PID:1536
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1900

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\171515.tmp
        Filesize

        522.9MB

        MD5

        f2628c5dce23002e36de9ef4868dd355

        SHA1

        68ed54d8f41846e4ae6aa307db273a78366b19b2

        SHA256

        439ea1f948d9fe110f5d72c5adf2cd96843bfef8214351f733f8ed92afefc24e

        SHA512

        760fddc7777cc34432ba43768483342d6954ae3e6b013b06fc2f6bbac508bafd3a6517a490f5a642514d559d496f77a98c84542851e17ad8e3b8e17c16f51083

      • C:\Users\Admin\AppData\Local\Temp\171520.zip
        Filesize

        962KB

        MD5

        facbee8335997018721773ddc6bc1e5d

        SHA1

        e1016d9024c04f8cbb796df87b484dd05592e10b

        SHA256

        b2e1b0128f1ed95eff9a9786a380976f2477cd3a916f1074f622840318d3654a

        SHA512

        821c8f16567eba7578b519ed4ad55daf60c0702472cbe3db6b59fdf4cc77038a3121e7db8001efb7091d1701e4245d22306390440b58449dc7fa45472d0b4dba

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        759f7344db2f30f15b7fefbd3cd44b81

        SHA1

        5f92dd512bc5547ea6d4e869ec37d2bb3e58cd2c

        SHA256

        8cff98b09e1069e23ba122380f13e7fe4354af693458edb0d3af7321d9e3c271

        SHA512

        fba16525c2b757815c96a6a104167620c5911d20b181ac81fc76d43ceea8a81273f44b8ce31a7556c6e8528560875a32b498455545ef1c6bac611fe7c58bb644

      • \Users\Admin\AppData\Local\Temp\171515.tmp
        Filesize

        522.9MB

        MD5

        f2628c5dce23002e36de9ef4868dd355

        SHA1

        68ed54d8f41846e4ae6aa307db273a78366b19b2

        SHA256

        439ea1f948d9fe110f5d72c5adf2cd96843bfef8214351f733f8ed92afefc24e

        SHA512

        760fddc7777cc34432ba43768483342d6954ae3e6b013b06fc2f6bbac508bafd3a6517a490f5a642514d559d496f77a98c84542851e17ad8e3b8e17c16f51083

      • \Users\Admin\AppData\Local\Temp\171515.tmp
        Filesize

        522.9MB

        MD5

        f2628c5dce23002e36de9ef4868dd355

        SHA1

        68ed54d8f41846e4ae6aa307db273a78366b19b2

        SHA256

        439ea1f948d9fe110f5d72c5adf2cd96843bfef8214351f733f8ed92afefc24e

        SHA512

        760fddc7777cc34432ba43768483342d6954ae3e6b013b06fc2f6bbac508bafd3a6517a490f5a642514d559d496f77a98c84542851e17ad8e3b8e17c16f51083

      • memory/1372-842-0x0000000000120000-0x0000000000121000-memory.dmp
        Filesize

        4KB

      • memory/1536-847-0x0000000000140000-0x0000000000141000-memory.dmp
        Filesize

        4KB

      • memory/1992-76-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-81-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-67-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-68-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-69-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-70-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-71-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-72-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-73-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-74-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-75-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1992-78-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-79-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-80-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-64-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-82-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-77-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-66-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-83-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-61-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-84-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-111-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-65-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-63-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-62-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-60-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-59-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-58-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB

      • memory/1992-57-0x0000000000790000-0x0000000000890000-memory.dmp
        Filesize

        1024KB