Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    24-03-2023 22:00

General

  • Target

    08032023.doc

  • Size

    525.3MB

  • MD5

    d2dee88803a04a6457a9c62840e53223

  • SHA1

    1be346c29ae7d0bfa91b50532bd16bba6c0bf624

  • SHA256

    eaf050eabdfffde46a85a1651438dbbae8a3e048090c80f231efddef019895a0

  • SHA512

    42e7a7dc77e54575563378be4f605baaee5fe7df2ffb823caeec1c06eae140e5bcaa34c74def12ebc8c8eb274be30e5b9c2eb696f13c0b4b0d410867acf5eea7

  • SSDEEP

    3072:2JX29m8QBUoItA/leC6gSJ+2JiclnUOvrRxqmLcHeNJxPkdVdTRcDK6:2EmleC6gSJWclU0RxVLcHe5cdTR

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\08032023.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\230130.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:588
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\230130.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1144
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KMkoqUBYfOgQ\JZVYQPOuzElM.dll"
          4⤵
            PID:1532
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:284

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\230130.tmp
        Filesize

        527.5MB

        MD5

        d4d306a6d9d1ae637e0cfacf04f7431a

        SHA1

        68b7fb0aa0d65569aa62937620f58a50bd3e9fdd

        SHA256

        a6e1b44ccb61a67b8e16ddc67eccacdd4b9b31a9de1fd048793c5c46b22337e2

        SHA512

        d473a2c746eba2b0add8252f5d44eca39b5a862978de80bc8e0d83f3adfee4601f21bcba3f63caa4fda02fc4c79cae704ac0905f4c938af8abbc2381332f682c

      • C:\Users\Admin\AppData\Local\Temp\230136.zip
        Filesize

        821KB

        MD5

        f1ec7bd22e219fdb389f5e2a0a8132df

        SHA1

        fe8cf0aa2da1a147024c82ac45989795e5b467e0

        SHA256

        8582757782e4048ba84898de0953c7c9710d84c2e764d1fca8b1d393c436dbc8

        SHA512

        2b77027da8f0811f7cfc3735e579c4fd7e3506d85fa78ad667e88bd43dc0ab376d2b8b0c6aab3d35678810a9ee6e589b93d60aa481239ad3acf91cadc88f4969

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        86713db754977a2248d806d2a80ac6c8

        SHA1

        e45d0f85258ae974fd1dcbb2e1016c750a66ee99

        SHA256

        cb75df24d9b5bd0bc500f50d67667b68a7ca72c7f32957abd2df72d9b1e1d0c8

        SHA512

        97deadd8cf95ec456b3066d3cfc8b4a6870dd1087054a5cd6a5008072dba0c4ff6747f9abaecc6f4f843853b0ea4c38052e587b96a2825a22f3249695309c76f

      • \Users\Admin\AppData\Local\Temp\230130.tmp
        Filesize

        527.5MB

        MD5

        d4d306a6d9d1ae637e0cfacf04f7431a

        SHA1

        68b7fb0aa0d65569aa62937620f58a50bd3e9fdd

        SHA256

        a6e1b44ccb61a67b8e16ddc67eccacdd4b9b31a9de1fd048793c5c46b22337e2

        SHA512

        d473a2c746eba2b0add8252f5d44eca39b5a862978de80bc8e0d83f3adfee4601f21bcba3f63caa4fda02fc4c79cae704ac0905f4c938af8abbc2381332f682c

      • \Users\Admin\AppData\Local\Temp\230130.tmp
        Filesize

        527.5MB

        MD5

        d4d306a6d9d1ae637e0cfacf04f7431a

        SHA1

        68b7fb0aa0d65569aa62937620f58a50bd3e9fdd

        SHA256

        a6e1b44ccb61a67b8e16ddc67eccacdd4b9b31a9de1fd048793c5c46b22337e2

        SHA512

        d473a2c746eba2b0add8252f5d44eca39b5a862978de80bc8e0d83f3adfee4601f21bcba3f63caa4fda02fc4c79cae704ac0905f4c938af8abbc2381332f682c

      • memory/1144-1766-0x00000000001C0000-0x00000000001C1000-memory.dmp
        Filesize

        4KB

      • memory/1532-1767-0x00000000003B0000-0x00000000003B1000-memory.dmp
        Filesize

        4KB

      • memory/1980-108-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-113-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-88-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-90-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-91-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-92-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-93-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-94-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-95-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-97-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-98-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-100-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-101-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-102-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-103-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-105-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-106-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1980-109-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-110-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-112-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-86-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-114-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-115-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-111-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-107-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-104-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-99-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-96-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-116-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-89-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-85-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-139-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-87-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-1509-0x0000000006230000-0x0000000006231000-memory.dmp
        Filesize

        4KB

      • memory/1980-84-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-82-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-83-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-81-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-80-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/1980-1772-0x0000000006230000-0x0000000006231000-memory.dmp
        Filesize

        4KB

      • memory/1980-79-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB