General

  • Target

    Mes 2021_01_12 MBI30509.doc

  • Size

    162KB

  • Sample

    210114-drmn5m9rxn

  • MD5

    8c4f915689cb0027a512029d26ed3a64

  • SHA1

    70d5aa56b71be28d00b9e9d18e4bd55d86efafdf

  • SHA256

    dafd019e4c0f0574a418f4f0cb748cfc1d60fedaca191fa3e45ecc2e8058779c

  • SHA512

    9b937f0d42a12da806358f62d97ceed33c786531af8201cf8296f1611fd729ac9ac107d0491983db567c8780e37f57da8698f418f77db619ff3f4b80a359ec1a

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.mitraship.com/wp-content/ZKeB/

exe.dropper

http://djsrecord.com/wp-includes/abop/

exe.dropper

https://lastfrontierstrekking.com/new/2OaabFU/

exe.dropper

https://watchnshirt.com/y/L7z9YcA/

exe.dropper

https://www.impipower.com/wp-content/U/

exe.dropper

https://www.inkayniperutours.com/druver/LtcG/

exe.dropper

https://vysimopoulos.com/d/NF/

Targets

    • Target

      Mes 2021_01_12 MBI30509.doc

    • Size

      162KB

    • MD5

      8c4f915689cb0027a512029d26ed3a64

    • SHA1

      70d5aa56b71be28d00b9e9d18e4bd55d86efafdf

    • SHA256

      dafd019e4c0f0574a418f4f0cb748cfc1d60fedaca191fa3e45ecc2e8058779c

    • SHA512

      9b937f0d42a12da806358f62d97ceed33c786531af8201cf8296f1611fd729ac9ac107d0491983db567c8780e37f57da8698f418f77db619ff3f4b80a359ec1a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks