General

  • Target

    Arc-835.doc

  • Size

    162KB

  • Sample

    210114-bct9vlf82a

  • MD5

    0fcd9569ef0690d4931268b090b913c1

  • SHA1

    b7944313d64fd0f548c16a40da2fb485c376e359

  • SHA256

    043eee7522492a5e9e3026f7afb191926db12ac96ee20475ebdc26eab2993095

  • SHA512

    8338e42782c49c024f34b7fc2b2a6ea8f6094ca5cfd115af38ca4d7b9e2863f128b27370201fddd58901adbdf4c54a148cb2533780da1aa467cf9a7a9a10518e

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.mitraship.com/wp-content/ZKeB/

exe.dropper

http://djsrecord.com/wp-includes/abop/

exe.dropper

https://lastfrontierstrekking.com/new/2OaabFU/

exe.dropper

https://watchnshirt.com/y/L7z9YcA/

exe.dropper

https://www.impipower.com/wp-content/U/

exe.dropper

https://www.inkayniperutours.com/druver/LtcG/

exe.dropper

https://vysimopoulos.com/d/NF/

Targets

    • Target

      Arc-835.doc

    • Size

      162KB

    • MD5

      0fcd9569ef0690d4931268b090b913c1

    • SHA1

      b7944313d64fd0f548c16a40da2fb485c376e359

    • SHA256

      043eee7522492a5e9e3026f7afb191926db12ac96ee20475ebdc26eab2993095

    • SHA512

      8338e42782c49c024f34b7fc2b2a6ea8f6094ca5cfd115af38ca4d7b9e2863f128b27370201fddd58901adbdf4c54a148cb2533780da1aa467cf9a7a9a10518e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks