Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows10_x64 -
resource
win10 -
submitted
26-08-2020 13:47
Static task
static1
Behavioral task
behavioral1
Sample
Notification082520.doc
Resource
win7v200722
General
-
Target
Notification082520.doc
-
Size
285KB
-
MD5
f9cac6a43d460d5afc7428a1014a59af
-
SHA1
e7ae3fe9226a646711c7b31593e05368b4395d2a
-
SHA256
49a193afe2b75716f99338d1653dd321db5b0b4af3be050691605a861471be2e
-
SHA512
c12f18c7e4fee24fdcaf145178967295c5d11d6565590cc3f3db8fbf7d30432185651151156873142e52137ac50787d8d6f9d992ec4a149cbdf3a5926b59746d
Malware Config
Extracted
trickbot
1000513
chil103
51.89.177.20:443
194.5.249.174:443
107.174.196.242:443
185.205.209.241:443
82.146.46.220:443
5.34.178.126:443
212.22.70.65:443
195.123.241.90:443
185.164.32.214:443
198.46.198.139:443
195.123.241.187:443
86.104.194.116:443
195.123.240.252:443
185.164.32.215:443
45.148.120.195:443
45.138.158.32:443
5.149.253.99:443
92.62.65.163:449
88.247.212.56:449
180.211.170.214:449
186.159.8.218:449
158.181.155.153:449
27.147.173.227:449
103.130.114.106:449
103.221.254.102:449
187.109.119.99:449
220.247.174.12:449
183.81.154.113:449
121.101.185.130:449
200.116.159.183:449
200.116.232.186:449
103.87.169.150:449
180.211.95.14:449
103.36.48.103:449
45.127.222.8:449
112.109.19.178:449
36.94.33.102:449
110.232.249.13:449
177.190.69.162:449
-
autorunName:pwgrab
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exeREGSVR32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 3336 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 552 3336 REGSVR32.exe -
Templ.dll packer 4 IoCs
Detects Templ.dll packer which usually loads Trickbot.
Processes:
resource yara_rule behavioral2/memory/632-11-0x0000000003390000-0x00000000033BE000-memory.dmp templ_dll behavioral2/memory/632-11-0x0000000003390000-0x00000000033BE000-memory.dmp templ_dll behavioral2/memory/632-12-0x0000000003400000-0x000000000342C000-memory.dmp templ_dll behavioral2/memory/632-12-0x0000000003400000-0x000000000342C000-memory.dmp templ_dll -
Blacklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 5 3628 WScript.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 632 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000_Classes\Local Settings rundll32.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3044 WINWORD.EXE 3044 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 900 wermgr.exe Token: SeDebugPrivilege 900 wermgr.exe Token: SeDebugPrivilege 900 wermgr.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
rundll32.exeREGSVR32.exeregsvr32.exedescription pid process target process PID 2668 wrote to memory of 3628 2668 rundll32.exe WScript.exe PID 2668 wrote to memory of 3628 2668 rundll32.exe WScript.exe PID 552 wrote to memory of 632 552 REGSVR32.exe regsvr32.exe PID 552 wrote to memory of 632 552 REGSVR32.exe regsvr32.exe PID 552 wrote to memory of 632 552 REGSVR32.exe regsvr32.exe PID 632 wrote to memory of 900 632 regsvr32.exe wermgr.exe PID 632 wrote to memory of 900 632 regsvr32.exe wermgr.exe PID 632 wrote to memory of 900 632 regsvr32.exe wermgr.exe PID 632 wrote to memory of 900 632 regsvr32.exe wermgr.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Notification082520.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3044
-
C:\Windows\system32\rundll32.exerundll32.exe zipfldr.dll,RouteTheCall c:\syslogs\fa.vbs1⤵
- Process spawned unexpected child process
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\syslogs\fa.vbs"2⤵
- Blacklisted process makes network request
PID:3628
-
-
C:\Windows\system32\REGSVR32.exeREGSVR32 -s c:\syslogs\w_monitor.dll1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\regsvr32.exe-s c:\syslogs\w_monitor.dll2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-