Analysis

  • max time kernel
    107s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2023 16:19

General

  • Target

    Electronic form.doc

  • Size

    274KB

  • MD5

    113a55bb02adefcc77f9d5569dacf6dc

  • SHA1

    60d9d3c06a0dbaf92dcf535556dd0a8fd5ab49d4

  • SHA256

    e2ea5af25c4e1942320c3893fadfd80955d059cd9fa0e9e8bb4e5b78f2c2576b

  • SHA512

    3806674a54a9f0a2dc61bd5e747a727d7de0c55680ef5486a2e8d7fb001bbe12d36dbe455f79e44b40ccdef88586885345c6677cd5718df50424b2aff40897ab

  • SSDEEP

    3072:1zRMiEMzv9v6Pag5j6O3/Zdz+ABtm36eutCQI7siRs4Kfbd1E1s1s:PxdWaI3bm3JutC5giRIZ1Emy

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Electronic form.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\171928.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1000
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\171928.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1564
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\TSNjkilKAshY\mtJzXevvzSKv.dll"
          4⤵
            PID:2044
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1580

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\171928.tmp

        Filesize

        500.9MB

        MD5

        14ec6ab21eaa2e1250ead41fd8455bee

        SHA1

        65767515daf75de6f2a991b55ac3b2ab156d7816

        SHA256

        1acd2c582eb7030a89269211f867b29bd7fe0d05328275066fc80c2c71787b42

        SHA512

        8b4e188f47af93fdb97ef907f57f97dc40b06848bab4e86d5b292e2692c5781833e27e45002e8cb5ac3ae02370942d839062dfd33e6db46e4492b75cca55de95

      • C:\Users\Admin\AppData\Local\Temp\171930.zip

        Filesize

        940KB

        MD5

        6badd642023ce03a20492e4208a6eac0

        SHA1

        55e092ea0296dd7ba8a2430b879b934f2661a546

        SHA256

        7f9fe2a8a43cf7b4cbc05a470b1aeaf2519a319e048a8e79758867c6c418690b

        SHA512

        a5a429680c941a722906682fdc36908ca47f4b954ec214bd9297439ee106218c401eda698be2d33789b90d4f5d9dc41334938c53117d060e58f6c7552663d46c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        e6521fc946bed4ee25273ee975a6be48

        SHA1

        5954684ea0b2295ea98f3ae3ac5c650be5b8d55b

        SHA256

        2389d9aad2c73201eb6212a33d6e5602f1134ede623f47b9197410343d35c324

        SHA512

        1ca07c51e238cde985dafedf9f5fa05bca75741afef213802c62e11ebdceaec56967aa72d2a46d4d54d76e04b424f96d00b116f9ad1d22869e92e96ca7a26821

      • \Users\Admin\AppData\Local\Temp\171928.tmp

        Filesize

        500.9MB

        MD5

        14ec6ab21eaa2e1250ead41fd8455bee

        SHA1

        65767515daf75de6f2a991b55ac3b2ab156d7816

        SHA256

        1acd2c582eb7030a89269211f867b29bd7fe0d05328275066fc80c2c71787b42

        SHA512

        8b4e188f47af93fdb97ef907f57f97dc40b06848bab4e86d5b292e2692c5781833e27e45002e8cb5ac3ae02370942d839062dfd33e6db46e4492b75cca55de95

      • \Users\Admin\AppData\Local\Temp\171928.tmp

        Filesize

        500.9MB

        MD5

        14ec6ab21eaa2e1250ead41fd8455bee

        SHA1

        65767515daf75de6f2a991b55ac3b2ab156d7816

        SHA256

        1acd2c582eb7030a89269211f867b29bd7fe0d05328275066fc80c2c71787b42

        SHA512

        8b4e188f47af93fdb97ef907f57f97dc40b06848bab4e86d5b292e2692c5781833e27e45002e8cb5ac3ae02370942d839062dfd33e6db46e4492b75cca55de95

      • memory/1564-842-0x00000000002A0000-0x00000000002A1000-memory.dmp

        Filesize

        4KB

      • memory/2016-133-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-349-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-160-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-187-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-191-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-214-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-241-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-268-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-295-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-296-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-322-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2016-376-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-405-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-403-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-106-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-83-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-82-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-81-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-80-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2016-79-0x00000000003F0000-0x00000000004F0000-memory.dmp

        Filesize

        1024KB

      • memory/2044-847-0x00000000002F0000-0x00000000002F1000-memory.dmp

        Filesize

        4KB