Analysis

  • max time kernel
    95s
  • max time network
    99s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-12-2020 01:51

General

  • Target

    material 12.20.doc

  • Size

    76KB

  • MD5

    a96af6fea5159248793d711bf1b2d1eb

  • SHA1

    851bcae7c7a22f5ac42ca27637053da54006c961

  • SHA256

    549cb76628b35238ae936cf8802162b8b6514b633be15fce41c086410f5292fe

  • SHA512

    351f045e26ed22a112ef00952957e865390be974579115df75d0a40d83d86934b2dc4459e9f56a0166e1fe3d15156d2655bf481f35dc660fe0742ecc4c2fba0b

Score
10/10

Malware Config

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\material 12.20.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1844
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" url.dll,OpenURL c:\users\public\index.hta
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\users\public\index.hta"
        3⤵
        • Blocklisted process makes network request
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1776
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" c:\programdata\aOhCq.pdf,ShowDialogA -r
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:1088
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1736

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\users\public\index.hta
      MD5

      069a9cb4de9b5afc58f79f96efaf7214

      SHA1

      e63a3ed294045325f8fc7e00bb9a58ae55bde8d3

      SHA256

      5c26eac54ae3c0e05e0d526566c591dc0709c24b87e3f094e35cecca9b6b2774

      SHA512

      7e4bb29bc67d37c23671aaca49d2cde0b1281f2b89269c0f0310f46c2b8f99292ebefb73e62949097e95e4c1a18d2b3fb451c09c992f73118ae647652a443eca

    • \??\c:\programdata\aOhCq.pdf
      MD5

      c665948d39d19476f64a56a0ca37a338

      SHA1

      202fd1f5ac5410f20132ec1ec2a959a9e094cfce

      SHA256

      a48e2d9fcf1e7258733203612f11c74cd3db4d421ccbfd633d87ca935bd41265

      SHA512

      bef8671973fca8265ee6dcb8b7aeeaca8776633abd591e6ba5408df6d8f2c9f2b6969eb1f9eb8db1a11d1c06793d1af16783e8ce54da54a07fc33b50b0f484a6

    • \ProgramData\aOhCq.pdf
      MD5

      c665948d39d19476f64a56a0ca37a338

      SHA1

      202fd1f5ac5410f20132ec1ec2a959a9e094cfce

      SHA256

      a48e2d9fcf1e7258733203612f11c74cd3db4d421ccbfd633d87ca935bd41265

      SHA512

      bef8671973fca8265ee6dcb8b7aeeaca8776633abd591e6ba5408df6d8f2c9f2b6969eb1f9eb8db1a11d1c06793d1af16783e8ce54da54a07fc33b50b0f484a6

    • memory/1088-9-0x0000000000000000-mapping.dmp
    • memory/1528-8-0x000007FEF7120000-0x000007FEF739A000-memory.dmp
      Filesize

      2.5MB

    • memory/1736-7-0x0000000000000000-mapping.dmp
    • memory/1776-6-0x0000000000000000-mapping.dmp
    • memory/1776-12-0x0000000005F30000-0x0000000005F53000-memory.dmp
      Filesize

      140KB

    • memory/1844-2-0x0000000005CDE000-0x0000000005D04000-memory.dmp
      Filesize

      152KB

    • memory/1844-3-0x000000000074D000-0x0000000000751000-memory.dmp
      Filesize

      16KB

    • memory/1988-4-0x0000000000000000-mapping.dmp