Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    03-12-2020 13:08

General

  • Target

    info-12.20.doc

  • Size

    144KB

  • MD5

    eb89b281323cbba25c8c1080cf2f62ff

  • SHA1

    a3d5cab21da7d69f80c3fc62a16cee52e3398846

  • SHA256

    24b030711a69d5121a177ab5a4d8a27849b763f8bdbd8a37c1346f716c4c221e

  • SHA512

    817c131568474240f0139d688ff362fcf406b189bb6537028005dc0952597e4d9db612677f82f9593eff00053583f9017e2bfcb4545a01a83a5d4f9d8d4b8c8f

Score
10/10

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 68 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\info-12.20.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 c:\programdata\RrKki.pdf
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      PID:1556
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1504
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:912 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:576
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:820
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:820 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1692

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\programdata\RrKki.pdf
      MD5

      2b8e31cc34b23a1fa8768fc8e088e5aa

      SHA1

      ba51f9f5ae3aac40a69309c6f9b77064423f02a0

      SHA256

      5348c314afb52079c6c35643e8a749c2d51c5447c78f7e28251b0cca4de6797a

      SHA512

      740c368dde35703b8782261e42bbf3b57e0b05f9c51a2a72010d484cdbbe5c7a36826b37b5189e4c36437f541e3282aa0c071192f7ce4ac8ee4873a5b79fa8fa

    • \ProgramData\RrKki.pdf
      MD5

      2b8e31cc34b23a1fa8768fc8e088e5aa

      SHA1

      ba51f9f5ae3aac40a69309c6f9b77064423f02a0

      SHA256

      5348c314afb52079c6c35643e8a749c2d51c5447c78f7e28251b0cca4de6797a

      SHA512

      740c368dde35703b8782261e42bbf3b57e0b05f9c51a2a72010d484cdbbe5c7a36826b37b5189e4c36437f541e3282aa0c071192f7ce4ac8ee4873a5b79fa8fa

    • memory/576-10-0x0000000000000000-mapping.dmp
    • memory/576-11-0x00000000063E0000-0x0000000006403000-memory.dmp
      Filesize

      140KB

    • memory/752-9-0x000007FEF6F80000-0x000007FEF71FA000-memory.dmp
      Filesize

      2.5MB

    • memory/1504-8-0x0000000000000000-mapping.dmp
    • memory/1556-5-0x0000000000000000-mapping.dmp
    • memory/1656-2-0x0000000000681000-0x0000000000684000-memory.dmp
      Filesize

      12KB

    • memory/1656-4-0x0000000000605000-0x0000000000609000-memory.dmp
      Filesize

      16KB

    • memory/1656-3-0x0000000000605000-0x0000000000609000-memory.dmp
      Filesize

      16KB

    • memory/1692-12-0x0000000000000000-mapping.dmp