Analysis

  • max time kernel
    103s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    21-07-2021 14:47

General

  • Target

    command,07.21.doc

  • Size

    69KB

  • MD5

    1b265cbdfb47ef2675bbc19d7542aec3

  • SHA1

    f441fde137975ecfa73c6b9d80423872443b4247

  • SHA256

    173e1ba2a7c2995c59bd1d79c8c246dc5f75835552574c87bd9bd8129977de4d

  • SHA512

    62232fd788671d69bcdb725a52dec70caab92f790a7ae6b2f7964dd6ba5b6dd28526d0df11c428ed0bc1a910cecdac26445332e9016bbf5aa4c594e8779af255

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Tries to connect to .bazar domain 36 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\command,07.21.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\programdata\sds.hta
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\programdata\sds.hta"
        3⤵
        • Blocklisted process makes network request
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" c:\users\public\girlYou.jpg
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1732
          • C:\Windows\system32\regsvr32.exe
            c:\users\public\girlYou.jpg
            5⤵
            • Loads dropped DLL
            PID:1692
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:300

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\programdata\sds.hta

      MD5

      6cf8aee8344612d0abc243d87c729b7a

      SHA1

      eebe12b6ae78a08aa289a021f78f28a66275408e

      SHA256

      fda3898a2ec3a99f67b26503ccda8eab6fde313df3aa3a9f6ce4ffb62a2ff49b

      SHA512

      e086c23487a4ee5084b6b111732263d7d0aaf9e8c61400eae5b956160d60e5bac723aec5469f14933db7d9fb630e56eaa48ba31fc0c0c07d033e9dffaaf45827

    • \??\c:\users\public\girlYou.jpg

      MD5

      9ea54059855e1e754c09dca1e247966f

      SHA1

      9178c5ecb80c26e5744f5199f7a184570b21f121

      SHA256

      4317d61bba715029afa826af53d2e6f75237d0a2dc7069092c310719aa1394c0

      SHA512

      6274a1fde335716b0e0ebd13c51c478d6688ea9d42b2b83c5f2556f412b52c0717cd45ec3ef9989b58e77722b52e37f36d9da263f817c0527276e4b6494bbe67

    • \Users\Public\girlYou.jpg

      MD5

      9ea54059855e1e754c09dca1e247966f

      SHA1

      9178c5ecb80c26e5744f5199f7a184570b21f121

      SHA256

      4317d61bba715029afa826af53d2e6f75237d0a2dc7069092c310719aa1394c0

      SHA512

      6274a1fde335716b0e0ebd13c51c478d6688ea9d42b2b83c5f2556f412b52c0717cd45ec3ef9989b58e77722b52e37f36d9da263f817c0527276e4b6494bbe67

    • \Users\Public\girlYou.jpg

      MD5

      9ea54059855e1e754c09dca1e247966f

      SHA1

      9178c5ecb80c26e5744f5199f7a184570b21f121

      SHA256

      4317d61bba715029afa826af53d2e6f75237d0a2dc7069092c310719aa1394c0

      SHA512

      6274a1fde335716b0e0ebd13c51c478d6688ea9d42b2b83c5f2556f412b52c0717cd45ec3ef9989b58e77722b52e37f36d9da263f817c0527276e4b6494bbe67

    • memory/300-76-0x0000000000000000-mapping.dmp

    • memory/1080-63-0x0000000075D11000-0x0000000075D13000-memory.dmp

      Filesize

      8KB

    • memory/1080-62-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1080-61-0x00000000707D1000-0x00000000707D3000-memory.dmp

      Filesize

      8KB

    • memory/1080-60-0x0000000072D51000-0x0000000072D54000-memory.dmp

      Filesize

      12KB

    • memory/1080-78-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1536-67-0x0000000000000000-mapping.dmp

    • memory/1692-72-0x0000000000000000-mapping.dmp

    • memory/1692-73-0x000007FEFC251000-0x000007FEFC253000-memory.dmp

      Filesize

      8KB

    • memory/1692-75-0x0000000001EB0000-0x000000000215A000-memory.dmp

      Filesize

      2.7MB

    • memory/1732-68-0x0000000000000000-mapping.dmp

    • memory/2000-64-0x0000000000000000-mapping.dmp