Resubmissions
10-11-2020 14:09
201110-j4kq1f84yn 1010-11-2020 13:52
201110-tjb64jlajj 1010-11-2020 13:37
201110-ad9dyxzvqj 810-11-2020 13:27
201110-kb2vhm8a22 8Analysis
-
max time kernel
521s -
max time network
548s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-11-2020 14:09
Static task
static1
General
-
Target
Document_11_9.doc
-
Size
1.2MB
-
MD5
bc0cc1e707b236fbd5cf9b27ff3c9461
-
SHA1
8b4c8c22c4b14dd5d9d6cc4975bf6f2af208e924
-
SHA256
dd3f16d98fa14d7e5fb83b3917ff3a42a5cf74356c4ec46391b608b20355d5fe
-
SHA512
df8bdce95f04ebf58112c994fc79792a76722f1ef7af5364994b1e46dafb517e9cc320a260a11b2336959a883c7d349bdd068f6bdcf01a83bd6e8ce964988688
Malware Config
Extracted
trickbot
100001
tar2
66.85.183.5:443
185.163.47.157:443
94.140.115.99:443
195.123.240.40:443
195.123.241.226:443
-
autorunName:pwgrab
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
EXPLORER.EXEEXPLORER.EXEdescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 912 1052 EXPLORER.EXE EXCEL.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1096 1580 EXPLORER.EXE EXCEL.EXE -
Blacklisted process makes network request 1 IoCs
Processes:
cmd.exeflow pid process 20 904 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
asdpogasdjabn.exepid process 1208 asdpogasdjabn.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ident.me 7 ident.me -
Drops file in System32 directory 1 IoCs
Processes:
wermgr.exedescription ioc process File created C:\Windows\system32\cn\imskuuj.txt wermgr.exe -
Modifies service 2 TTPs 2 IoCs
Processes:
ipconfig.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Shas ipconfig.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Qecs ipconfig.exe -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Discovers systems in the same network 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
EXCEL.EXEEXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1496 ipconfig.exe -
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE -
Modifies registry class 280 IoCs
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents6" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF}\ = "Controls" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{92E11A03-7358-11CE-80CB-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}\ = "IControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLTextArea" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1ABB1740-1177-4E6A-978A-CF7C28C1D2DC} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\TypeLib\{1ABB1740-1177-4E6A-978A-CF7C28C1D2DC}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE\\MSForms.exd" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}\ = "MdcTextEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}\ = "IControl" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLOption" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}\ = "MdcToggleButtonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\TypeLib\{1ABB1740-1177-4E6A-978A-CF7C28C1D2DC}\2.0\FLAGS WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\TypeLib\{1ABB1740-1177-4E6A-978A-CF7C28C1D2DC}\2.0\FLAGS\ = "6" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF}\ = "ICommandButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\TypeLib\{1ABB1740-1177-4E6A-978A-CF7C28C1D2DC}\2.0\0 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}\ = "_UserForm" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF}\ = "ICommandButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLCheckbox" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLCheckbox" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" WINWORD.EXE -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEEXCEL.EXEpid process 1660 WINWORD.EXE 1580 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
cmd.execmd.exepid process 1140 cmd.exe 904 cmd.exe 1140 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wermgr.execmd.exedescription pid process Token: SeDebugPrivilege 1144 wermgr.exe Token: SeDebugPrivilege 1140 cmd.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
WINWORD.EXEEXCEL.EXEEXCEL.EXEasdpogasdjabn.exepid process 1660 WINWORD.EXE 1660 WINWORD.EXE 1052 EXCEL.EXE 1580 EXCEL.EXE 1208 asdpogasdjabn.exe 1208 asdpogasdjabn.exe -
Suspicious use of WriteProcessMemory 733 IoCs
Processes:
WINWORD.EXEEXCEL.EXEexplorer.exeEXCEL.EXEexplorer.exeasdpogasdjabn.exewermgr.exedescription pid process target process PID 1660 wrote to memory of 532 1660 WINWORD.EXE splwow64.exe PID 1660 wrote to memory of 532 1660 WINWORD.EXE splwow64.exe PID 1660 wrote to memory of 532 1660 WINWORD.EXE splwow64.exe PID 1660 wrote to memory of 532 1660 WINWORD.EXE splwow64.exe PID 1052 wrote to memory of 912 1052 EXCEL.EXE EXPLORER.EXE PID 1052 wrote to memory of 912 1052 EXCEL.EXE EXPLORER.EXE PID 1052 wrote to memory of 912 1052 EXCEL.EXE EXPLORER.EXE PID 1052 wrote to memory of 912 1052 EXCEL.EXE EXPLORER.EXE PID 1724 wrote to memory of 852 1724 explorer.exe WScript.exe PID 1724 wrote to memory of 852 1724 explorer.exe WScript.exe PID 1724 wrote to memory of 852 1724 explorer.exe WScript.exe PID 1580 wrote to memory of 1096 1580 EXCEL.EXE EXPLORER.EXE PID 1580 wrote to memory of 1096 1580 EXCEL.EXE EXPLORER.EXE PID 1580 wrote to memory of 1096 1580 EXCEL.EXE EXPLORER.EXE PID 1580 wrote to memory of 1096 1580 EXCEL.EXE EXPLORER.EXE PID 944 wrote to memory of 1208 944 explorer.exe asdpogasdjabn.exe PID 944 wrote to memory of 1208 944 explorer.exe asdpogasdjabn.exe PID 944 wrote to memory of 1208 944 explorer.exe asdpogasdjabn.exe PID 944 wrote to memory of 1208 944 explorer.exe asdpogasdjabn.exe PID 1208 wrote to memory of 1144 1208 asdpogasdjabn.exe wermgr.exe PID 1208 wrote to memory of 1144 1208 asdpogasdjabn.exe wermgr.exe PID 1208 wrote to memory of 1144 1208 asdpogasdjabn.exe wermgr.exe PID 1208 wrote to memory of 1144 1208 asdpogasdjabn.exe wermgr.exe PID 1208 wrote to memory of 1144 1208 asdpogasdjabn.exe wermgr.exe PID 1208 wrote to memory of 1144 1208 asdpogasdjabn.exe wermgr.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe PID 1144 wrote to memory of 1140 1144 wermgr.exe cmd.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Document_11_9.doc"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\EXPLORER.EXEEXPLORER.EXE C:\Artrite\SarilumabSAR153191.vbe2⤵
- Process spawned unexpected child process
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Artrite\SarilumabSAR153191.vbe"2⤵
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\EXPLORER.EXEEXPLORER.EXE C:\Artrite\Final_Joana\asdpogasdjabn.exe2⤵
- Process spawned unexpected child process
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
-
C:\Artrite\Final_Joana\asdpogasdjabn.exe"C:\Artrite\Final_Joana\asdpogasdjabn.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Blacklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\ipconfig.exeipconfig /all5⤵
- Modifies service
- Gathers network information
-
C:\Windows\system32\net.exenet config workstation5⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 config workstation6⤵
-
C:\Windows\system32\net.exenet view /all5⤵
- Discovers systems in the same network
-
C:\Windows\system32\net.exenet view /all /domain5⤵
- Discovers systems in the same network
-
C:\Windows\system32\nltest.exenltest /domain_trusts5⤵
-
C:\Windows\system32\nltest.exenltest /domain_trusts /all_trusts5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Artrite\Final_Joana\asdpogasdjabn.exeMD5
3ba7d3dbc17ce640e0bb3dd5f989169b
SHA184ee0b6e02339f1deb33d75693551db444923ba8
SHA25652da51085e5c6d650abf866b1268ccd81d6c0b2c424e12807dc0ac176ac8c929
SHA5123a683b35dc6b6c17de5a21171625c3fb5259d60c73867aa81b89cedeef61f1b95cce099cc5bb4fdeb2ddf7f2f0236c6d877970768a7f91330ecfbbc38931a231
-
C:\Artrite\Final_Joana\asdpogasdjabn.exeMD5
3ba7d3dbc17ce640e0bb3dd5f989169b
SHA184ee0b6e02339f1deb33d75693551db444923ba8
SHA25652da51085e5c6d650abf866b1268ccd81d6c0b2c424e12807dc0ac176ac8c929
SHA5123a683b35dc6b6c17de5a21171625c3fb5259d60c73867aa81b89cedeef61f1b95cce099cc5bb4fdeb2ddf7f2f0236c6d877970768a7f91330ecfbbc38931a231
-
C:\Artrite\SarilumabSAR153191.vbeMD5
6f2314cbd7bffa272bbfb31ac8130424
SHA15b40478da6e5b7686fcec2d9688290cafc7cc728
SHA256f9777b111637d3d9994717dba4565a49e5218048d2bf15ad6799a5b43f4dc8d7
SHA5120f387fd35a4d062853c8f7d22693aace323892465ac2ab818edf553ea56436577e6d0caee5b8f98f13d80f076ae3e4e864e16b87e19d826a4232a687fcba6012
-
\??\PIPE\NETLOGONMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/532-0-0x0000000000000000-mapping.dmp
-
memory/852-8-0x0000000000000000-mapping.dmp
-
memory/852-17-0x0000000002800000-0x0000000002804000-memory.dmpFilesize
16KB
-
memory/904-69-0x0000000000290000-0x0000000000290080-memory.dmpFilesize
128B
-
memory/904-120-0x0000000000250000-0x0000000000250188-memory.dmpFilesize
392B
-
memory/904-68-0x0000000180000000-0x0000000180016000-memory.dmpFilesize
88KB
-
memory/904-66-0x0000000180000000-0x0000000180016000-memory.dmpFilesize
88KB
-
memory/904-122-0x0000000000230000-0x000000000023000D-memory.dmpFilesize
13B
-
memory/904-109-0x0000000000250000-0x0000000000250188-memory.dmpFilesize
392B
-
memory/904-104-0x0000000000290000-0x0000000000290080-memory.dmpFilesize
128B
-
memory/904-72-0x0000000000230000-0x000000000023000D-memory.dmpFilesize
13B
-
memory/904-71-0x0000000000240000-0x0000000000240400-memory.dmpFilesize
1024B
-
memory/904-58-0x0000000000000000-mapping.dmp
-
memory/912-6-0x0000000000000000-mapping.dmp
-
memory/1096-15-0x0000000000000000-mapping.dmp
-
memory/1140-23-0x0000000000000000-mapping.dmp
-
memory/1140-35-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/1140-36-0x00000000000C0000-0x00000000000C0017-memory.dmpFilesize
23B
-
memory/1140-123-0x00000000000C0000-0x00000000000C0017-memory.dmpFilesize
23B
-
memory/1144-22-0x0000000000000000-mapping.dmp
-
memory/1160-118-0x0000000000000000-mapping.dmp
-
memory/1208-20-0x00000000004B0000-0x00000000004EE000-memory.dmpFilesize
248KB
-
memory/1208-21-0x00000000004F0000-0x000000000052A000-memory.dmpFilesize
232KB
-
memory/1208-18-0x0000000000000000-mapping.dmp
-
memory/1212-113-0x0000000000000000-mapping.dmp
-
memory/1316-114-0x0000000000000000-mapping.dmp
-
memory/1496-110-0x0000000000000000-mapping.dmp
-
memory/1656-112-0x0000000000000000-mapping.dmp
-
memory/1660-4-0x0000000000762000-0x0000000000766000-memory.dmpFilesize
16KB
-
memory/1660-12-0x00000000069C0000-0x00000000069C4000-memory.dmpFilesize
16KB
-
memory/1660-13-0x0000000009DD0000-0x0000000009DD4000-memory.dmpFilesize
16KB
-
memory/1660-11-0x0000000009620000-0x0000000009624000-memory.dmpFilesize
16KB
-
memory/1660-9-0x0000000001EB0000-0x0000000001EB1000-memory.dmpFilesize
4KB
-
memory/1660-5-0x00000000063B3000-0x00000000063B7000-memory.dmpFilesize
16KB
-
memory/1660-14-0x0000000004670000-0x0000000004674000-memory.dmpFilesize
16KB
-
memory/1660-3-0x0000000000762000-0x0000000000766000-memory.dmpFilesize
16KB
-
memory/1660-2-0x0000000000762000-0x0000000000766000-memory.dmpFilesize
16KB
-
memory/1660-1-0x0000000004E40000-0x0000000004E44000-memory.dmpFilesize
16KB
-
memory/1868-117-0x0000000000000000-mapping.dmp
-
memory/1976-115-0x0000000000000000-mapping.dmp