Resubmissions

14-01-2021 11:54

210114-7xa6tfh59x 10

14-01-2021 11:48

210114-q634htvf9a 10

14-01-2021 01:32

210114-d1g1zn1d22 8

Analysis

  • max time kernel
    243s
  • max time network
    240s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-01-2021 11:54

General

  • Target

    sample1.bin.doc

  • Size

    830KB

  • MD5

    7dbd8ecfada1d39a81a58c9468b91039

  • SHA1

    0d21e2742204d1f98f6fcabe0544570fd6857dd3

  • SHA256

    dc40e48d2eb0e57cd16b1792bdccc185440f632783c7bcc87c955e1d4e88fc95

  • SHA512

    a851ac80b43ebdb8e990c2eb3daabb456516fc40bb43c9f76d0112674dbd6264efce881520744f0502f2962fc0bb4024e7d73ea66d56bc87c0cc6dfde2ab869a

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\sample1.bin.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1240
    • C:\Windows\system32\Certutil.exe
      Certutil -decode C:\Users\Public\Ksh1.xls C:\Users\Public\Ksh1.pdf
      1⤵
      • Process spawned unexpected child process
      PID:296
    • C:\Windows\system32\Rundll32.exe
      Rundll32 C:\Users\Public\Ksh1.pdf,In
      1⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Windows\SysWOW64\rundll32.exe
        Rundll32 C:\Users\Public\Ksh1.pdf,In
        2⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:1344
        • C:\Users\Admin\AppData\Local\Temp\tmp_e473b4.exe
          C:\Users\Admin\AppData\Local\Temp/tmp_e473b4.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2020

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp_e473b4.exe
      MD5

      e87553aebac0bf74d165a87321c629be

      SHA1

      011fe975f5e1bb070856ea28525053f6e2d36897

      SHA256

      9f3a07e6a4b0588cc4fcf4185639bde5806d212ea3b3ab8916fed2b1cc9414a7

      SHA512

      259cc675e5e258cc1917e4a6701f4578345a78a42ab7850c17b5e943ea4f5f0bdac9e7cfd709b64684bd390e078449879b1678704b20f109e1bb08ccdbfe179a

    • C:\Users\Public\Ksh1.pdf
      MD5

      706ea7f029e6bc4dbf845db3366f9a0e

      SHA1

      942443dfb8784066523db761886115e08c99575f

      SHA256

      fb07f875dc45e6045735513e75a83c50c78154851bd23a645d43ea853e6800ac

      SHA512

      036d5de7e732302ef81989fba62abb1375119fc8141748d6548ed2310e95bdc07468ada5cbf06c4f721b2b95caf51e3267d4ef6db2a2031cf5c8b2abee1c15a3

    • C:\Users\Public\Ksh1.xls
      MD5

      d631ab4ceff199b52ff4e4b7aad0199d

      SHA1

      f30002c31bf32184507182100942a2012f0b8703

      SHA256

      9de083f693c144a38d697089f6560a2efe81b1ad1c5385ec07d6b41bb54b8ffe

      SHA512

      56b3941cd93658f7df8976213e2dfd5cb74e7abb651ad26fda9b7191e675e03289366b32eedf68d139562a88dbbae2589fda8abbdb756c43e2e605863459a162

    • \Users\Admin\AppData\Local\Temp\tmp_e473b4.exe
      MD5

      e87553aebac0bf74d165a87321c629be

      SHA1

      011fe975f5e1bb070856ea28525053f6e2d36897

      SHA256

      9f3a07e6a4b0588cc4fcf4185639bde5806d212ea3b3ab8916fed2b1cc9414a7

      SHA512

      259cc675e5e258cc1917e4a6701f4578345a78a42ab7850c17b5e943ea4f5f0bdac9e7cfd709b64684bd390e078449879b1678704b20f109e1bb08ccdbfe179a

    • \Users\Admin\AppData\Local\Temp\tmp_e473b4.exe
      MD5

      e87553aebac0bf74d165a87321c629be

      SHA1

      011fe975f5e1bb070856ea28525053f6e2d36897

      SHA256

      9f3a07e6a4b0588cc4fcf4185639bde5806d212ea3b3ab8916fed2b1cc9414a7

      SHA512

      259cc675e5e258cc1917e4a6701f4578345a78a42ab7850c17b5e943ea4f5f0bdac9e7cfd709b64684bd390e078449879b1678704b20f109e1bb08ccdbfe179a

    • \Users\Public\Ksh1.pdf
      MD5

      706ea7f029e6bc4dbf845db3366f9a0e

      SHA1

      942443dfb8784066523db761886115e08c99575f

      SHA256

      fb07f875dc45e6045735513e75a83c50c78154851bd23a645d43ea853e6800ac

      SHA512

      036d5de7e732302ef81989fba62abb1375119fc8141748d6548ed2310e95bdc07468ada5cbf06c4f721b2b95caf51e3267d4ef6db2a2031cf5c8b2abee1c15a3

    • memory/1240-2-0x0000000000000000-mapping.dmp
    • memory/1344-6-0x0000000000000000-mapping.dmp
    • memory/1680-3-0x000007FEF7510000-0x000007FEF778A000-memory.dmp
      Filesize

      2.5MB

    • memory/2020-10-0x0000000000000000-mapping.dmp
    • memory/2020-14-0x0000000002A70000-0x0000000002A74000-memory.dmp
      Filesize

      16KB

    • memory/2020-15-0x0000000002670000-0x0000000002674000-memory.dmp
      Filesize

      16KB