Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    07-07-2020 17:19

General

  • Target

    docs.07.20.doc

  • Size

    113KB

  • MD5

    5efe9db9cb82aa803bde6324da4c9e4b

  • SHA1

    a7b1bf50f60e63b93c30f7f68b6af65903a2f6d6

  • SHA256

    6ea8cc744827230b359edb312e5c4117091b7c856fcdd25dc2b7ca3eea11512c

  • SHA512

    e612bb133a1b305a03b4d67b5c51aa2ecb08315304900304c58c3a64d0b7343df981e9b102dc6b1f06912673aa801c21b40507b5c946cac0fc0ed7972556d772

Score
10/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\docs.07.20.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of WriteProcessMemory
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    PID:1612
    • C:\Windows\System32\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" PC.tmp
      2⤵
      • Suspicious use of WriteProcessMemory
      • Process spawned unexpected child process
      PID:1772
      • C:\Windows\SysWOW64\regsvr32.exe
        PC.tmp
        3⤵
        • Loads dropped DLL
        PID:4024
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    PID:3752
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3752 CREDAT:82945 /prefetch:2
      2⤵
      • Checks whether UAC is enabled
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3924
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    PID:3460
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3460 CREDAT:82945 /prefetch:2
      2⤵
      • Checks whether UAC is enabled
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:684
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    PID:1724
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:82945 /prefetch:2
      2⤵
      • Checks whether UAC is enabled
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1804

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\PC.tmp
  • \Users\Admin\AppData\Local\Temp\PC.tmp
  • memory/684-8-0x0000000000000000-mapping.dmp
  • memory/1772-3-0x0000000000000000-mapping.dmp
  • memory/1804-9-0x0000000000000000-mapping.dmp
  • memory/3924-7-0x0000000000000000-mapping.dmp
  • memory/4024-5-0x0000000000000000-mapping.dmp