Analysis

  • max time kernel
    70s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    17-12-2020 00:00

General

  • Target

    specifics,12.16.2020.doc

  • Size

    92KB

  • MD5

    ddf0d9e3d86f7542de8f619f00a7725a

  • SHA1

    082ba5b236a3b9a0ae5d8d6a070c3e764792e7f2

  • SHA256

    7561a0f5134bf3dbaa34d09f2a20dc01057626e74d7df42072bef06d6bd6ee95

  • SHA512

    7daf04c544334ba04c7f0e2b6654fee58ecf85cc4dabd42d9237a72d4d0beb833c4d72dfff9cc2f957b8eb6c68d18dcf4b24d919ca11ee88e24224619301c3d7

Score
10/10

Malware Config

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\specifics,12.16.2020.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" url.dll,OpenURL c:\users\public\index.hta
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\users\public\index.hta"
        3⤵
        • Blocklisted process makes network request
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1844
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" c:\programdata\ah6Q0.pdf,ShowDialogA -r
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:1220
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1840

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\users\public\index.hta
      MD5

      40c7509a0ef4fd0ef94508819d1d29ac

      SHA1

      4842a4ed5b75a445035fc6f800f9166a4e277928

      SHA256

      19349c14b4633c5d1f18d7cafb375e71c7a32862620245bec6b41836fe24aa5a

      SHA512

      539967b7839370d5505eeabb347052e3abd013c44b62c6a0eed81cddb8124acb87576251d43b1fd23f2b4b6e17b0700da76ad80087980ea316d7c33b3f0bc402

    • \??\c:\programdata\ah6Q0.pdf
      MD5

      bff30c762b160a79e2f4356e1a605694

      SHA1

      d72529431ae4eaea21288a5564ae1adb11938fc5

      SHA256

      adb85cdfe36c9f27d90b727f3dd4a59fe097dafb177208fc5951370cdb8fdb0f

      SHA512

      51841cc47d00db14d314c9d60dc41eafc25f82e4dfe9ab5feb54b303da1d4e01514e4613ff17656bc15682366a709741e463bb2cd0af6818fa1521cef40d7140

    • \ProgramData\ah6Q0.pdf
      MD5

      bff30c762b160a79e2f4356e1a605694

      SHA1

      d72529431ae4eaea21288a5564ae1adb11938fc5

      SHA256

      adb85cdfe36c9f27d90b727f3dd4a59fe097dafb177208fc5951370cdb8fdb0f

      SHA512

      51841cc47d00db14d314c9d60dc41eafc25f82e4dfe9ab5feb54b303da1d4e01514e4613ff17656bc15682366a709741e463bb2cd0af6818fa1521cef40d7140

    • memory/344-8-0x000007FEF63D0000-0x000007FEF664A000-memory.dmp
      Filesize

      2.5MB

    • memory/1220-9-0x0000000000000000-mapping.dmp
    • memory/1740-2-0x0000000000904000-0x0000000000907000-memory.dmp
      Filesize

      12KB

    • memory/1740-3-0x0000000000892000-0x0000000000896000-memory.dmp
      Filesize

      16KB

    • memory/1840-7-0x0000000000000000-mapping.dmp
    • memory/1844-6-0x0000000000000000-mapping.dmp
    • memory/1844-12-0x0000000006870000-0x0000000006893000-memory.dmp
      Filesize

      140KB

    • memory/1980-4-0x0000000000000000-mapping.dmp