Analysis

  • max time kernel
    1799s
  • max time network
    1800s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-11-2020 21:51

General

  • Target

    deed contract_11.19.2020.doc

  • Size

    104KB

  • MD5

    ab684a20573095e717d981ecf1aa3628

  • SHA1

    03e64be4b32f995c92d9a520e577af69ee74ac73

  • SHA256

    256fb74261454862a7d60629f94cfd17111a2e94d25abd68046be2b4ed4d9b87

  • SHA512

    b2aa52ad891f18ff76ddb3ba89518a1f599003d044b3e2e3525a605e467b81840286cef764c3caae128f44bfe14e2f28520d303a302076dc77b02cb147a89549

Score
8/10

Malware Config

Signatures

  • Blacklisted process makes network request 70 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\deed contract_11.19.2020.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Users\Admin\AppData\Local\Temp\in.com
      "C:\Users\Admin\AppData\Local\Temp\in.com" C:\Users\Admin\AppData\Local\Temp\in.html
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1152
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\temp.tmp,ShowDialogA -r
        3⤵
        • Blacklisted process makes network request
        • Loads dropped DLL
        • Modifies system certificate store
        PID:680
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1800

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\in.com
      MD5

      abdfc692d9fe43e2ba8fe6cb5a8cb95a

      SHA1

      d4f0397f83083e1c6fb0894187cc72aebcf2f34f

      SHA256

      949485ba939953642714ae6831d7dcb261691cac7cbb8c1a9220333801f60820

      SHA512

      c786bfb6a2316e43cb89901fae103157ec6b65117c292dc7570dd4685891b5afbb72064789b74bf55fe012c5936ed6468876e4d2cccdeff71b4abb2d76ff395f

    • C:\Users\Admin\AppData\Local\Temp\in.com
      MD5

      abdfc692d9fe43e2ba8fe6cb5a8cb95a

      SHA1

      d4f0397f83083e1c6fb0894187cc72aebcf2f34f

      SHA256

      949485ba939953642714ae6831d7dcb261691cac7cbb8c1a9220333801f60820

      SHA512

      c786bfb6a2316e43cb89901fae103157ec6b65117c292dc7570dd4685891b5afbb72064789b74bf55fe012c5936ed6468876e4d2cccdeff71b4abb2d76ff395f

    • C:\Users\Admin\AppData\Local\Temp\in.html
      MD5

      5897a9ec9e6d33494599a6f48c5ab622

      SHA1

      1451ccf5e1d28c08430b3a4bb15ee57e9d35bf6b

      SHA256

      3d9f00f9355fb518d2104bf07c5b8068a98ee357bacea2c4610cab34b55be9e5

      SHA512

      6693b49c6666c59bcc79aacedc95186c34c9b7890fa2a7115bd29c1d10f97c7912bdf78b05b1b5db838693da14ebb23c0f04008ae5e79d3563c6aa1db97514e0

    • C:\Users\Admin\AppData\Local\Temp\temp.tmp
      MD5

      1296a2f1297fc4f50c7272f25a30539c

      SHA1

      3232cc880600c2afd3fc6e3f88e10b0eb7d47e13

      SHA256

      a693a20855c3b8971ddd112a73664c2d895149ed7b9b7e0a30c35f44fed65601

      SHA512

      3285e5976b772389da7391ee0ee8075ebe46aa5686a34b02c32e28f0e4697d963274c97bb4d6caeaec60625ced0c2aa702ec1f762ee2fa47fc0e5374f7f86219

    • \Users\Admin\AppData\Local\Temp\in.com
      MD5

      abdfc692d9fe43e2ba8fe6cb5a8cb95a

      SHA1

      d4f0397f83083e1c6fb0894187cc72aebcf2f34f

      SHA256

      949485ba939953642714ae6831d7dcb261691cac7cbb8c1a9220333801f60820

      SHA512

      c786bfb6a2316e43cb89901fae103157ec6b65117c292dc7570dd4685891b5afbb72064789b74bf55fe012c5936ed6468876e4d2cccdeff71b4abb2d76ff395f

    • \Users\Admin\AppData\Local\Temp\in.com
      MD5

      abdfc692d9fe43e2ba8fe6cb5a8cb95a

      SHA1

      d4f0397f83083e1c6fb0894187cc72aebcf2f34f

      SHA256

      949485ba939953642714ae6831d7dcb261691cac7cbb8c1a9220333801f60820

      SHA512

      c786bfb6a2316e43cb89901fae103157ec6b65117c292dc7570dd4685891b5afbb72064789b74bf55fe012c5936ed6468876e4d2cccdeff71b4abb2d76ff395f

    • \Users\Admin\AppData\Local\Temp\temp.tmp
      MD5

      1296a2f1297fc4f50c7272f25a30539c

      SHA1

      3232cc880600c2afd3fc6e3f88e10b0eb7d47e13

      SHA256

      a693a20855c3b8971ddd112a73664c2d895149ed7b9b7e0a30c35f44fed65601

      SHA512

      3285e5976b772389da7391ee0ee8075ebe46aa5686a34b02c32e28f0e4697d963274c97bb4d6caeaec60625ced0c2aa702ec1f762ee2fa47fc0e5374f7f86219

    • memory/680-12-0x0000000000000000-mapping.dmp
    • memory/1040-3-0x00000000003C7000-0x00000000003CB000-memory.dmp
      Filesize

      16KB

    • memory/1040-0-0x0000000004D7D000-0x0000000004D82000-memory.dmp
      Filesize

      20KB

    • memory/1040-2-0x00000000003C7000-0x00000000003CB000-memory.dmp
      Filesize

      16KB

    • memory/1040-1-0x0000000000427000-0x000000000042A000-memory.dmp
      Filesize

      12KB

    • memory/1040-17-0x0000000007F90000-0x0000000007F94000-memory.dmp
      Filesize

      16KB

    • memory/1040-18-0x0000000007F90000-0x0000000007F94000-memory.dmp
      Filesize

      16KB

    • memory/1040-19-0x0000000007B90000-0x0000000007B94000-memory.dmp
      Filesize

      16KB

    • memory/1152-6-0x0000000000000000-mapping.dmp
    • memory/1664-10-0x000007FEF7880000-0x000007FEF7AFA000-memory.dmp
      Filesize

      2.5MB

    • memory/1800-8-0x0000000000000000-mapping.dmp