Analysis

  • max time kernel
    112s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-07-2021 18:38

General

  • Target

    deed contract,07.21.doc

  • Size

    74KB

  • MD5

    2d0088012b6c1f399e946a8e5b513e36

  • SHA1

    25b7290bf78fce2951ee78df721994890b2d8aad

  • SHA256

    f6c286e79ec7023e8ff292c6f71ad0ecc8fef8463e8d2fe1aa0d527c3d833b01

  • SHA512

    4a2b1d82a52cf7b268a5abdcac5e17b0d080e18de23bebbd9bb2b39484ff42a525b339dd05f9cd86d38f244d0ba819429cac8d49355e69afea764b435fefd8f4

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\deed contract,07.21.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3920
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c c:\programdata\funcToProc.hta
      2⤵
      • Process spawned unexpected child process
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\programdata\funcToProc.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        3⤵
          PID:1816
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 1300
            4⤵
            • Suspicious use of NtCreateProcessExOtherParentProcess
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1100

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    3
    T1082

    Query Registry

    2
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\programdata\funcToProc.hta
      MD5

      bc4be77135061df095a403023bae0109

      SHA1

      2fc60dd93271d314a961e47e18b64ab28ae8d327

      SHA256

      dc57fcce608c4997a28a47c3ba309091a6ca6920b91ec8fa5b859c7fb94193f3

      SHA512

      b002a6527ba4b8d7b0616929bf4dac29341d65798c6fd2ecb45a331de0a9a5753f0cc3d64caf51e7edea1a3b0faa42998dd54abb51a5778e80d5252cb3ec9be4

    • memory/1816-232-0x0000000000000000-mapping.dmp
    • memory/2104-192-0x0000000000000000-mapping.dmp
    • memory/3920-117-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
      Filesize

      64KB

    • memory/3920-118-0x00007FF970480000-0x00007FF972FA3000-memory.dmp
      Filesize

      43.1MB

    • memory/3920-119-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
      Filesize

      64KB

    • memory/3920-122-0x00007FF969780000-0x00007FF96A86E000-memory.dmp
      Filesize

      16.9MB

    • memory/3920-123-0x00007FF967880000-0x00007FF969775000-memory.dmp
      Filesize

      31.0MB

    • memory/3920-114-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
      Filesize

      64KB

    • memory/3920-116-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
      Filesize

      64KB

    • memory/3920-115-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
      Filesize

      64KB

    • memory/3920-343-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
      Filesize

      64KB

    • memory/3920-344-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
      Filesize

      64KB

    • memory/3920-345-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
      Filesize

      64KB

    • memory/3920-346-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
      Filesize

      64KB