General

  • Target

    GreenwoodApt_2021-03-09_11 36 57.zip

  • Size

    50KB

  • Sample

    210309-kdba46tm2n

  • MD5

    9a910aa50bbbafd5a168365f2522f8a2

  • SHA1

    83a715be28c118af37052d36882d9736c1fdb4c3

  • SHA256

    e8ec3c800918f4bf63495f27156ff61e1199b3cce848a83b414dee46f1535cdc

  • SHA512

    4fccf9ef92d2548be62f7bb2a77001eb727c34e5aaf04c856c9e0c9735ad9302b95ed8a8911132fd0b0fbec3c5ff26cee6cbcf00bd614e820b013b9d0eec1ba2

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://urbandogscol.com/wp-content/xiqjp4/

exe.dropper

http://spidersheet.com/wp-includes/js/swfupload/k0924/

exe.dropper

http://artoftribalindia.com/wp-content/uploads/r74d6u4/

exe.dropper

https://navinfamilywines.com/alloldfiles.zip/zegkb671/

exe.dropper

https://gabisan-shipping.com/n4mf/syz49i21/

Targets

    • Target

      Device/HarddiskVolume2/Users/user/Downloads/Attachments 19 G06979262.doc

    • Size

      87KB

    • MD5

      68fdeafc7361bbc3321f3828e902cda6

    • SHA1

      7abacfccb89a75f3faef70b8fc3963eb7bd647c8

    • SHA256

      1ab055b3121ec3823a0a3002eb1fe8f48d5c7f04d9f0e92496165fb2cc1ec9c2

    • SHA512

      340a5ecf9c17cb3798c8e473c9e20297e4dbdf5e85d1acc87daae4f54a34eb76adc288bf76e5efb70ad6f6343033446654a7dd5a6fbe32b62c365410c6f0f4fc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks