Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows10_x64 -
resource
win10 -
submitted
26-08-2020 13:47
Static task
static1
Behavioral task
behavioral1
Sample
Notification082520.doc
Resource
win7v200722
General
-
Target
Notification082520.doc
-
Size
285KB
-
MD5
f9cac6a43d460d5afc7428a1014a59af
-
SHA1
e7ae3fe9226a646711c7b31593e05368b4395d2a
-
SHA256
49a193afe2b75716f99338d1653dd321db5b0b4af3be050691605a861471be2e
-
SHA512
c12f18c7e4fee24fdcaf145178967295c5d11d6565590cc3f3db8fbf7d30432185651151156873142e52137ac50787d8d6f9d992ec4a149cbdf3a5926b59746d
Malware Config
Extracted
trickbot
1000513
chil103
51.89.177.20:443
194.5.249.174:443
107.174.196.242:443
185.205.209.241:443
82.146.46.220:443
5.34.178.126:443
212.22.70.65:443
195.123.241.90:443
185.164.32.214:443
198.46.198.139:443
195.123.241.187:443
86.104.194.116:443
195.123.240.252:443
185.164.32.215:443
45.148.120.195:443
45.138.158.32:443
5.149.253.99:443
92.62.65.163:449
88.247.212.56:449
180.211.170.214:449
186.159.8.218:449
158.181.155.153:449
27.147.173.227:449
103.130.114.106:449
103.221.254.102:449
187.109.119.99:449
220.247.174.12:449
183.81.154.113:449
121.101.185.130:449
200.116.159.183:449
200.116.232.186:449
103.87.169.150:449
180.211.95.14:449
103.36.48.103:449
45.127.222.8:449
112.109.19.178:449
36.94.33.102:449
110.232.249.13:449
177.190.69.162:449
-
autorunName:pwgrab
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 3336 rundll32.exe 68 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 552 3336 REGSVR32.exe 68 -
Templ.dll packer 4 IoCs
Detects Templ.dll packer which usually loads Trickbot.
resource yara_rule behavioral2/memory/632-11-0x0000000003390000-0x00000000033BE000-memory.dmp templ_dll behavioral2/memory/632-11-0x0000000003390000-0x00000000033BE000-memory.dmp templ_dll behavioral2/memory/632-12-0x0000000003400000-0x000000000342C000-memory.dmp templ_dll behavioral2/memory/632-12-0x0000000003400000-0x000000000342C000-memory.dmp templ_dll -
Blacklisted process makes network request 1 IoCs
flow pid Process 5 3628 WScript.exe -
Loads dropped DLL 1 IoCs
pid Process 632 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000_Classes\Local Settings rundll32.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3044 WINWORD.EXE 3044 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 900 wermgr.exe Token: SeDebugPrivilege 900 wermgr.exe Token: SeDebugPrivilege 900 wermgr.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2668 wrote to memory of 3628 2668 rundll32.exe 72 PID 2668 wrote to memory of 3628 2668 rundll32.exe 72 PID 552 wrote to memory of 632 552 REGSVR32.exe 76 PID 552 wrote to memory of 632 552 REGSVR32.exe 76 PID 552 wrote to memory of 632 552 REGSVR32.exe 76 PID 632 wrote to memory of 900 632 regsvr32.exe 77 PID 632 wrote to memory of 900 632 regsvr32.exe 77 PID 632 wrote to memory of 900 632 regsvr32.exe 77 PID 632 wrote to memory of 900 632 regsvr32.exe 77
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Notification082520.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3044
-
C:\Windows\system32\rundll32.exerundll32.exe zipfldr.dll,RouteTheCall c:\syslogs\fa.vbs1⤵
- Process spawned unexpected child process
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\syslogs\fa.vbs"2⤵
- Blacklisted process makes network request
PID:3628
-
-
C:\Windows\system32\REGSVR32.exeREGSVR32 -s c:\syslogs\w_monitor.dll1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\regsvr32.exe-s c:\syslogs\w_monitor.dll2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-