Analysis

  • max time kernel
    111s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2023 16:18

General

  • Target

    SPE930231839KJ.doc

  • Size

    284KB

  • MD5

    1ed1a8d46dc3e3d89fdbf5eb00f42edb

  • SHA1

    1b6e2c9ba31d58d4e330874314e59a7fce33dad5

  • SHA256

    d7e01bffc54e99f8ead1a8499dae9d51fa259a4f18062f2d5312cd3ee09394ad

  • SHA512

    817af8445436c2325e8d2c5047b66149d776dca834f4b1fb584e938f287791cd0545c59430dbd927c3a88c23ec0c06f10f2272085a1c1913ac1a4a05af0287d2

  • SSDEEP

    3072:2IdQGckpM56QDp+SBTA8ku4afD4Ka1Rvl/4Wbqzwc7vanLubTvjVwKVi3yJuq6r:x9HkpzTTfD4KuNbqzryKvmKV8yJor

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SPE930231839KJ.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\171815.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\171815.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DVnOlfCEtCTXJ\WMhZKtY.dll"
          4⤵
            PID:2040
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:756

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\171815.tmp
        Filesize

        522.9MB

        MD5

        f2628c5dce23002e36de9ef4868dd355

        SHA1

        68ed54d8f41846e4ae6aa307db273a78366b19b2

        SHA256

        439ea1f948d9fe110f5d72c5adf2cd96843bfef8214351f733f8ed92afefc24e

        SHA512

        760fddc7777cc34432ba43768483342d6954ae3e6b013b06fc2f6bbac508bafd3a6517a490f5a642514d559d496f77a98c84542851e17ad8e3b8e17c16f51083

      • C:\Users\Admin\AppData\Local\Temp\171820.zip
        Filesize

        962KB

        MD5

        facbee8335997018721773ddc6bc1e5d

        SHA1

        e1016d9024c04f8cbb796df87b484dd05592e10b

        SHA256

        b2e1b0128f1ed95eff9a9786a380976f2477cd3a916f1074f622840318d3654a

        SHA512

        821c8f16567eba7578b519ed4ad55daf60c0702472cbe3db6b59fdf4cc77038a3121e7db8001efb7091d1701e4245d22306390440b58449dc7fa45472d0b4dba

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        6c5b93f30a65eeff199c756166696cde

        SHA1

        9ad345e2e0a98853f69c704c3708db080d796a9b

        SHA256

        81731e5ee218282578598a47f6e360081321b51fb81ecd61a787f10753821c0f

        SHA512

        b0991de140bf784ca1ef342c5767348ae5e303b036942dfa1a5e2918a9a753b67b9b4d1a70625e9de03925e206dbf9e80bc78d69b0d0121247eaaee52995fec2

      • \Users\Admin\AppData\Local\Temp\171815.tmp
        Filesize

        522.9MB

        MD5

        f2628c5dce23002e36de9ef4868dd355

        SHA1

        68ed54d8f41846e4ae6aa307db273a78366b19b2

        SHA256

        439ea1f948d9fe110f5d72c5adf2cd96843bfef8214351f733f8ed92afefc24e

        SHA512

        760fddc7777cc34432ba43768483342d6954ae3e6b013b06fc2f6bbac508bafd3a6517a490f5a642514d559d496f77a98c84542851e17ad8e3b8e17c16f51083

      • \Users\Admin\AppData\Local\Temp\171815.tmp
        Filesize

        522.9MB

        MD5

        f2628c5dce23002e36de9ef4868dd355

        SHA1

        68ed54d8f41846e4ae6aa307db273a78366b19b2

        SHA256

        439ea1f948d9fe110f5d72c5adf2cd96843bfef8214351f733f8ed92afefc24e

        SHA512

        760fddc7777cc34432ba43768483342d6954ae3e6b013b06fc2f6bbac508bafd3a6517a490f5a642514d559d496f77a98c84542851e17ad8e3b8e17c16f51083

      • memory/1704-268-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-349-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-133-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-160-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-187-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-214-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-241-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1704-295-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-296-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-322-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-106-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-376-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-403-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-83-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-82-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-81-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-80-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1704-79-0x00000000007A0000-0x00000000008A0000-memory.dmp
        Filesize

        1024KB

      • memory/1796-846-0x00000000002A0000-0x00000000002A1000-memory.dmp
        Filesize

        4KB

      • memory/2040-847-0x0000000000130000-0x0000000000131000-memory.dmp
        Filesize

        4KB