Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 08:28
Behavioral task
behavioral1
Sample
PO#2207008 .docm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PO#2207008 .docm
Resource
win10v2004-20241007-en
General
-
Target
PO#2207008 .docm
-
Size
15KB
-
MD5
9ce250e7dace223506f0d22240530bb6
-
SHA1
24a87a2730fb3913369ae8f67ea459afc57976bd
-
SHA256
715a3d7675672d8474b83bedfee8e594b96856fa34a915debf9ae57c171ee366
-
SHA512
3185e16fa152f586e91abf29e77087f3966a40e795487c17de1f8320b3c35ff06f99a57762203fb33a18b67e15f11ef451bd1fe30882f319177880bf562a39d3
-
SSDEEP
384:/imteTM+3an0i13Lp3kO/Xv+iT3eZazFkG:/LJ7v1393p/XGiT3N
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1492 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2936 nawBVBlSWH7iu7T.scr -
Loads dropped DLL 1 IoCs
pid Process 2700 WINWORD.EXE -
Uses the VBS compiler for execution 1 TTPs
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nawBVBlSWH7iu7T.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Office loads VBA resources, possible macro or embedded object present
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2360 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2700 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2936 nawBVBlSWH7iu7T.scr 2936 nawBVBlSWH7iu7T.scr 2936 nawBVBlSWH7iu7T.scr 1492 powershell.exe 2936 nawBVBlSWH7iu7T.scr 2936 nawBVBlSWH7iu7T.scr 2936 nawBVBlSWH7iu7T.scr 2936 nawBVBlSWH7iu7T.scr 2936 nawBVBlSWH7iu7T.scr 2936 nawBVBlSWH7iu7T.scr 2936 nawBVBlSWH7iu7T.scr 2936 nawBVBlSWH7iu7T.scr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2936 nawBVBlSWH7iu7T.scr Token: SeDebugPrivilege 1492 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2700 WINWORD.EXE 2700 WINWORD.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2936 2700 WINWORD.EXE 30 PID 2700 wrote to memory of 2936 2700 WINWORD.EXE 30 PID 2700 wrote to memory of 2936 2700 WINWORD.EXE 30 PID 2700 wrote to memory of 2936 2700 WINWORD.EXE 30 PID 2700 wrote to memory of 2348 2700 WINWORD.EXE 32 PID 2700 wrote to memory of 2348 2700 WINWORD.EXE 32 PID 2700 wrote to memory of 2348 2700 WINWORD.EXE 32 PID 2700 wrote to memory of 2348 2700 WINWORD.EXE 32 PID 2936 wrote to memory of 1492 2936 nawBVBlSWH7iu7T.scr 33 PID 2936 wrote to memory of 1492 2936 nawBVBlSWH7iu7T.scr 33 PID 2936 wrote to memory of 1492 2936 nawBVBlSWH7iu7T.scr 33 PID 2936 wrote to memory of 1492 2936 nawBVBlSWH7iu7T.scr 33 PID 2936 wrote to memory of 2360 2936 nawBVBlSWH7iu7T.scr 35 PID 2936 wrote to memory of 2360 2936 nawBVBlSWH7iu7T.scr 35 PID 2936 wrote to memory of 2360 2936 nawBVBlSWH7iu7T.scr 35 PID 2936 wrote to memory of 2360 2936 nawBVBlSWH7iu7T.scr 35 PID 2936 wrote to memory of 2068 2936 nawBVBlSWH7iu7T.scr 37 PID 2936 wrote to memory of 2068 2936 nawBVBlSWH7iu7T.scr 37 PID 2936 wrote to memory of 2068 2936 nawBVBlSWH7iu7T.scr 37 PID 2936 wrote to memory of 2068 2936 nawBVBlSWH7iu7T.scr 37 PID 2936 wrote to memory of 2408 2936 nawBVBlSWH7iu7T.scr 38 PID 2936 wrote to memory of 2408 2936 nawBVBlSWH7iu7T.scr 38 PID 2936 wrote to memory of 2408 2936 nawBVBlSWH7iu7T.scr 38 PID 2936 wrote to memory of 2408 2936 nawBVBlSWH7iu7T.scr 38 PID 2936 wrote to memory of 3036 2936 nawBVBlSWH7iu7T.scr 39 PID 2936 wrote to memory of 3036 2936 nawBVBlSWH7iu7T.scr 39 PID 2936 wrote to memory of 3036 2936 nawBVBlSWH7iu7T.scr 39 PID 2936 wrote to memory of 3036 2936 nawBVBlSWH7iu7T.scr 39 PID 2936 wrote to memory of 3052 2936 nawBVBlSWH7iu7T.scr 40 PID 2936 wrote to memory of 3052 2936 nawBVBlSWH7iu7T.scr 40 PID 2936 wrote to memory of 3052 2936 nawBVBlSWH7iu7T.scr 40 PID 2936 wrote to memory of 3052 2936 nawBVBlSWH7iu7T.scr 40 PID 2936 wrote to memory of 3032 2936 nawBVBlSWH7iu7T.scr 41 PID 2936 wrote to memory of 3032 2936 nawBVBlSWH7iu7T.scr 41 PID 2936 wrote to memory of 3032 2936 nawBVBlSWH7iu7T.scr 41 PID 2936 wrote to memory of 3032 2936 nawBVBlSWH7iu7T.scr 41
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PO#2207008 .docm"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\ProgramData\nawBVBlSWH7iu7T.scrC:\ProgramData\nawBVBlSWH7iu7T.scr2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YlGewDdvEIy.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YlGewDdvEIy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp95BA.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:2068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:2408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:3036
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:3052
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:3032
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5741d627cb627fe87c3958b2686b8cd56
SHA1f04ae81e3bb209ec14056a25f00a325c78aefa99
SHA2564d2d5efd129fa165a74300c2aa0aa1bc3bb16ec629d067e7fb91f66a03de579d
SHA512a75eb6474e3596c4557ea1a8dccbec274269c6c218fbf0a9dad805edd221b260c2f8ee6e7cd9461d27a00a085ef7c2dcca31fe6bf8c950457d3643940fe2df81
-
Filesize
576KB
MD5d75592cbb9d3ba728f0b27ad6218152c
SHA1549930cb2a9dc576c4f831793d8e29957d070551
SHA256c6a4e0fa597caf6381635be6ba6211ccb2c5d7161402e46128124c26750b945c
SHA512346fb36f74267d137173cb1e8838742fe1e595d29e7200f93943949c4331c0eb142f07cfc0a74874a697621603e4c62e78396865ae5da9c5f0f7c3bbda431e25