Analysis

  • max time kernel
    109s
  • max time network
    84s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2023 16:14

General

  • Target

    OG259431307915205_202303220812.doc

  • Size

    232KB

  • MD5

    49a307bb3ccce451737f2d6ba035efcf

  • SHA1

    7b2c5658f14b2999d4d2de3108a1ffeb04f0d899

  • SHA256

    53a0177376a77a326faff38d768c0e373120e558b72719340ff557ce28034567

  • SHA512

    a43c6578ffe7bedee0b3461e501a3490b9051a0891c7a119ce99820e826cb9b1e6658be9939923b8d00c3db2a73e86ffaebe59f42219ef1402988707bfa09e0c

  • SSDEEP

    3072:3C4JpR+K9y3LtqjsW5rQWm65BxPiP0wjEwRzpswUSkCI1ev2+6ssXR:nD7435u5aWmyBxK3MCI1ev2+6V

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 5 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\OG259431307915205_202303220812.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\171411.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\171411.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:760
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PZzJTIYIFEgAJ\xdOexNFeJJ.dll"
          4⤵
            PID:1676
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:924

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        61KB

        MD5

        e71c8443ae0bc2e282c73faead0a6dd3

        SHA1

        0c110c1b01e68edfacaeae64781a37b1995fa94b

        SHA256

        95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

        SHA512

        b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        5f82b12daea1028c4173071f8334a7e1

        SHA1

        2a191f998296f09ada28b17cabcd6ad671d093e5

        SHA256

        09335d0f2517a67eab34db03b55b7bf73c95f74f77c52181212f95f89b0aade7

        SHA512

        038b16d97af016eaa87c7691f48afa86c8b36a9f3f14806f06d8d61fa46d75f66a28b4157d7c805d2c845a2e3e8bb27322694d7f3911a4905a25dfd5e00e9375

      • C:\Users\Admin\AppData\Local\Temp\171411.tmp
        Filesize

        503.9MB

        MD5

        bd02f866091a97e01272f955e68702b7

        SHA1

        c65d29710a3798e779696d6261c4189f6bc4bf40

        SHA256

        d64db9a8548f570a24b4f5335dfaed9ff7b0ca688f10024a3e631e0fa6527fbe

        SHA512

        9953f5e241be0cca64e7b0cc56ddfc517bd93cb401582270a21bb13edeb4d43620401ab69e374a8e8f124872aa911487d9b00907c3b9f318f372b28a8f1a115d

      • C:\Users\Admin\AppData\Local\Temp\171417.zip
        Filesize

        943KB

        MD5

        f9b4e3ad40f2f360f3706ac0724d8255

        SHA1

        c7b5e3a547e3421810ee10a2651aca98c4c5595c

        SHA256

        3cfcd49402aeb820552355ff0b02f95540e0dc1dcfbc878868a32177b45acae0

        SHA512

        19e9bced2c12f851c34b91d392c2de396fcd9ff433ee26530edc9b1c56fa25a496c1af9e5deee9d4a13ac4d41097076e4a6e3df146060d39632174c51e283bba

      • C:\Users\Admin\AppData\Local\Temp\Cab1AE4.tmp
        Filesize

        61KB

        MD5

        fc4666cbca561e864e7fdf883a9e6661

        SHA1

        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

        SHA256

        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

        SHA512

        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

      • C:\Users\Admin\AppData\Local\Temp\Tar1C91.tmp
        Filesize

        161KB

        MD5

        be2bec6e8c5653136d3e72fe53c98aa3

        SHA1

        a8182d6db17c14671c3d5766c72e58d87c0810de

        SHA256

        1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

        SHA512

        0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        772ce7ad0af62538781fce16cbb088ed

        SHA1

        1a9935f9aaa2dcaa86ac5523a684b42cc184ae51

        SHA256

        1468d0d14c50ebfbc53a2e902a59d7e62ce188d432fe1084dd51cfac9b374e43

        SHA512

        610d2c5092a0e7fb7cb8eda5036b20c63078188ba915fbf9baa9cc7bf1917c985308e5c6083e425511aa0c09867f97c16ab4ce7c09a2dae87f828fb61872e756

      • \Users\Admin\AppData\Local\Temp\171411.tmp
        Filesize

        503.9MB

        MD5

        bd02f866091a97e01272f955e68702b7

        SHA1

        c65d29710a3798e779696d6261c4189f6bc4bf40

        SHA256

        d64db9a8548f570a24b4f5335dfaed9ff7b0ca688f10024a3e631e0fa6527fbe

        SHA512

        9953f5e241be0cca64e7b0cc56ddfc517bd93cb401582270a21bb13edeb4d43620401ab69e374a8e8f124872aa911487d9b00907c3b9f318f372b28a8f1a115d

      • \Users\Admin\AppData\Local\Temp\171411.tmp
        Filesize

        503.9MB

        MD5

        bd02f866091a97e01272f955e68702b7

        SHA1

        c65d29710a3798e779696d6261c4189f6bc4bf40

        SHA256

        d64db9a8548f570a24b4f5335dfaed9ff7b0ca688f10024a3e631e0fa6527fbe

        SHA512

        9953f5e241be0cca64e7b0cc56ddfc517bd93cb401582270a21bb13edeb4d43620401ab69e374a8e8f124872aa911487d9b00907c3b9f318f372b28a8f1a115d

      • memory/316-295-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-160-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-214-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-241-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-268-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/316-322-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-349-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-161-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-187-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-133-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-106-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-420-0x0000000005880000-0x0000000005980000-memory.dmp
        Filesize

        1024KB

      • memory/316-83-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-82-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-81-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-80-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/316-79-0x0000000000490000-0x0000000000590000-memory.dmp
        Filesize

        1024KB

      • memory/760-912-0x0000000000130000-0x0000000000131000-memory.dmp
        Filesize

        4KB

      • memory/1676-913-0x00000000003F0000-0x00000000003F1000-memory.dmp
        Filesize

        4KB