Analysis

  • max time kernel
    136s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-12-2020 01:51

General

  • Target

    material 12.20.doc

  • Size

    76KB

  • MD5

    a96af6fea5159248793d711bf1b2d1eb

  • SHA1

    851bcae7c7a22f5ac42ca27637053da54006c961

  • SHA256

    549cb76628b35238ae936cf8802162b8b6514b633be15fce41c086410f5292fe

  • SHA512

    351f045e26ed22a112ef00952957e865390be974579115df75d0a40d83d86934b2dc4459e9f56a0166e1fe3d15156d2655bf481f35dc660fe0742ecc4c2fba0b

Score
10/10

Malware Config

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\material 12.20.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" url.dll,OpenURL c:\users\public\index.hta
      2⤵
      • Process spawned unexpected child process
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\users\public\index.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of WriteProcessMemory
        PID:932
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" c:\programdata\aOhCq.pdf,ShowDialogA -r
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:1356

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\users\public\index.hta
    MD5

    069a9cb4de9b5afc58f79f96efaf7214

    SHA1

    e63a3ed294045325f8fc7e00bb9a58ae55bde8d3

    SHA256

    5c26eac54ae3c0e05e0d526566c591dc0709c24b87e3f094e35cecca9b6b2774

    SHA512

    7e4bb29bc67d37c23671aaca49d2cde0b1281f2b89269c0f0310f46c2b8f99292ebefb73e62949097e95e4c1a18d2b3fb451c09c992f73118ae647652a443eca

  • \??\c:\programdata\aOhCq.pdf
    MD5

    c665948d39d19476f64a56a0ca37a338

    SHA1

    202fd1f5ac5410f20132ec1ec2a959a9e094cfce

    SHA256

    a48e2d9fcf1e7258733203612f11c74cd3db4d421ccbfd633d87ca935bd41265

    SHA512

    bef8671973fca8265ee6dcb8b7aeeaca8776633abd591e6ba5408df6d8f2c9f2b6969eb1f9eb8db1a11d1c06793d1af16783e8ce54da54a07fc33b50b0f484a6

  • \ProgramData\aOhCq.pdf
    MD5

    c665948d39d19476f64a56a0ca37a338

    SHA1

    202fd1f5ac5410f20132ec1ec2a959a9e094cfce

    SHA256

    a48e2d9fcf1e7258733203612f11c74cd3db4d421ccbfd633d87ca935bd41265

    SHA512

    bef8671973fca8265ee6dcb8b7aeeaca8776633abd591e6ba5408df6d8f2c9f2b6969eb1f9eb8db1a11d1c06793d1af16783e8ce54da54a07fc33b50b0f484a6

  • memory/932-7-0x0000000000000000-mapping.dmp
  • memory/1356-8-0x0000000000000000-mapping.dmp
  • memory/2588-5-0x0000000000000000-mapping.dmp
  • memory/3932-2-0x00007FF906E30000-0x00007FF907467000-memory.dmp
    Filesize

    6.2MB

  • memory/3932-3-0x000001938BC4D000-0x000001938BC56000-memory.dmp
    Filesize

    36KB

  • memory/3932-4-0x000001938BC4D000-0x000001938BC56000-memory.dmp
    Filesize

    36KB