Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    03-12-2020 13:08

General

  • Target

    info-12.20.doc

  • Size

    144KB

  • MD5

    eb89b281323cbba25c8c1080cf2f62ff

  • SHA1

    a3d5cab21da7d69f80c3fc62a16cee52e3398846

  • SHA256

    24b030711a69d5121a177ab5a4d8a27849b763f8bdbd8a37c1346f716c4c221e

  • SHA512

    817c131568474240f0139d688ff362fcf406b189bb6537028005dc0952597e4d9db612677f82f9593eff00053583f9017e2bfcb4545a01a83a5d4f9d8d4b8c8f

Score
10/10

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 68 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 34 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\info-12.20.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\SYSTEM32\regsvr32.exe
      regsvr32 c:\programdata\RrKki.pdf
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3156
      • C:\Windows\SysWOW64\regsvr32.exe
        c:\programdata\RrKki.pdf
        3⤵
        • Loads dropped DLL
        PID:2140
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1332
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:82945 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:3784
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4028 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1844
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3244 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:648

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\programdata\RrKki.pdf
    MD5

    2b8e31cc34b23a1fa8768fc8e088e5aa

    SHA1

    ba51f9f5ae3aac40a69309c6f9b77064423f02a0

    SHA256

    5348c314afb52079c6c35643e8a749c2d51c5447c78f7e28251b0cca4de6797a

    SHA512

    740c368dde35703b8782261e42bbf3b57e0b05f9c51a2a72010d484cdbbe5c7a36826b37b5189e4c36437f541e3282aa0c071192f7ce4ac8ee4873a5b79fa8fa

  • \ProgramData\RrKki.pdf
    MD5

    2b8e31cc34b23a1fa8768fc8e088e5aa

    SHA1

    ba51f9f5ae3aac40a69309c6f9b77064423f02a0

    SHA256

    5348c314afb52079c6c35643e8a749c2d51c5447c78f7e28251b0cca4de6797a

    SHA512

    740c368dde35703b8782261e42bbf3b57e0b05f9c51a2a72010d484cdbbe5c7a36826b37b5189e4c36437f541e3282aa0c071192f7ce4ac8ee4873a5b79fa8fa

  • memory/648-15-0x0000000000000000-mapping.dmp
  • memory/1332-12-0x0000000000000000-mapping.dmp
  • memory/1844-14-0x0000000000000000-mapping.dmp
  • memory/2140-10-0x0000000000000000-mapping.dmp
  • memory/3008-5-0x0000015EE367E000-0x0000015EE3683000-memory.dmp
    Filesize

    20KB

  • memory/3008-7-0x0000015EE367E000-0x0000015EE3683000-memory.dmp
    Filesize

    20KB

  • memory/3008-6-0x0000015EE367E000-0x0000015EE3683000-memory.dmp
    Filesize

    20KB

  • memory/3008-2-0x00007FFC9E0E0000-0x00007FFC9E717000-memory.dmp
    Filesize

    6.2MB

  • memory/3008-4-0x0000015EE367E000-0x0000015EE3683000-memory.dmp
    Filesize

    20KB

  • memory/3008-3-0x0000015EE1385000-0x0000015EE13CF000-memory.dmp
    Filesize

    296KB

  • memory/3156-8-0x0000000000000000-mapping.dmp
  • memory/3784-13-0x0000000000000000-mapping.dmp