Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 03:12

General

  • Target

    Doc1.doc

  • Size

    41KB

  • MD5

    4a7652775c3c3a803b1aaa540aee8c6b

  • SHA1

    cbd1a7b2369a7040bae42876950a29689de3fd6c

  • SHA256

    7195150fb210ffff566fc1d4933512027227f49745d5d65d0ed6cece7f9a51ef

  • SHA512

    2234f5b5a29b95f3dc2e1df385e286a2832ae60085cb4c75aa97b5abf2fa8a4bd2fb5a15b3c26e30f4ec6cf8ee86f748717e5a53f9055d83a0483e70574ae0d5

  • SSDEEP

    384:N8iSsqdg1vA974tz0Ldfs9CTBpi/Ow+nkb9FdzClQA01zYlJPh:6+1o9A0LdfsEsPmnbl

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://192.168.45.222:443/xi6ujKcW9pNwNnE3FJOzJArDQSAERtkbqQ99IWLHx0ruInbjCUZRYJ2l_KyaX8KXiEZ6gYyO1p9NVm50Bqvr90PTwkbYqg5htK4NI2-sugi95XnjQRoMODn3BQjqi6jCDPWziB3lOtPEFW4Rvf9pyC09kkAD36Uw9_utq

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Doc1.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      ad42055a77ac47a8feab162ff01ea06b

      SHA1

      b4ccffadd1a9a1c02a330af0df1bea6a816f9cc7

      SHA256

      eaf17c0b77ce113cdf461d8b95214d0664fd564bccb4ef3a4180c86ebf3cc932

      SHA512

      428e6b96f51503388fafe3637feb90f1ffcf9d65e9f8482955bde5b23594b50bb6e60d17e74d5c3cee0af7a429c176fef77275d0e5a76966b16be46a19bcc832

    • memory/1788-22-0x0000000002660000-0x0000000002661000-memory.dmp

      Filesize

      4KB

    • memory/1788-29-0x0000000071B2D000-0x0000000071B38000-memory.dmp

      Filesize

      44KB

    • memory/1788-13-0x0000000005F30000-0x0000000006030000-memory.dmp

      Filesize

      1024KB

    • memory/1788-15-0x0000000005F30000-0x0000000006030000-memory.dmp

      Filesize

      1024KB

    • memory/1788-17-0x0000000000530000-0x0000000000630000-memory.dmp

      Filesize

      1024KB

    • memory/1788-19-0x0000000000530000-0x0000000000630000-memory.dmp

      Filesize

      1024KB

    • memory/1788-2-0x0000000071B2D000-0x0000000071B38000-memory.dmp

      Filesize

      44KB

    • memory/1788-21-0x0000000000530000-0x0000000000630000-memory.dmp

      Filesize

      1024KB

    • memory/1788-23-0x0000000005F30000-0x0000000006030000-memory.dmp

      Filesize

      1024KB

    • memory/1788-0-0x000000002FD51000-0x000000002FD52000-memory.dmp

      Filesize

      4KB

    • memory/1788-30-0x0000000005F30000-0x0000000006030000-memory.dmp

      Filesize

      1024KB

    • memory/1788-31-0x0000000000530000-0x0000000000630000-memory.dmp

      Filesize

      1024KB

    • memory/1788-32-0x0000000005F30000-0x0000000006030000-memory.dmp

      Filesize

      1024KB

    • memory/1788-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1788-47-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1788-49-0x0000000071B2D000-0x0000000071B38000-memory.dmp

      Filesize

      44KB