Resubmissions

22-10-2021 16:01

211022-tf86cacgbk 10

20-10-2021 20:51

211020-zncp1aheh9 10

Analysis

  • max time kernel
    1768s
  • max time network
    1769s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    20-10-2021 20:51

General

  • Target

    dictate 010.21.doc

  • Size

    34KB

  • MD5

    3128a1aa061355d275cd323336148c4a

  • SHA1

    63b5fba4691c68f0c268fd65b6dda64150b4facc

  • SHA256

    1cdae1a82f4320ba429c8aa6cb7b9236bae8edcf5fe67b79242aa0dcce157060

  • SHA512

    04d1e8e2b360a87f2e37a1d036cd415c4078546577cdc02528e1f32c64df917b86bb95a011e8b36eed30d3c18bf1633db458feb5140c28e076c2b170f621559a

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dictate 010.21.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\users\public\redKingIn.hta"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" c:\users\public\carolineLineLine.jpg
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1156
        • C:\Windows\system32\regsvr32.exe
          c:\users\public\carolineLineLine.jpg
          4⤵
          • Loads dropped DLL
          PID:1080
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1892

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\users\public\redKingIn.hta
      MD5

      fde6308f2d09731ef8c3457908ab41f3

      SHA1

      ff38e422ee794d25942fd01363154f6afd2039fa

      SHA256

      8f3d9dcbdd0b408eca4f7224a5f900ce86e3c9400ff96cc427a8c2a9c7105370

      SHA512

      405b0a6fb6b8930519263537ff673e42fb13eee54e14622229cf3d16187ee7512270f72c220501f26cc49a41c46c101a180045b59e7130dfa8bdf0df20144993

    • \??\c:\users\public\carolineLineLine.jpg
      MD5

      a4f08af1bbc66cfa2aa7a843677596e3

      SHA1

      6496d9a3d518a848353cc70196d8c9d4e89076af

      SHA256

      e202814d883235fc1d8b10a9bf96a6669443c6490fc959000551a4ea8311afca

      SHA512

      68c091dde8a097e39dc65051491d409ab8dc99377864553a9e03635dfb72ea8b922e79060c5fb0d7c9c9f11235a22e673145f5da665a3f51135942687440f809

    • \Users\Public\carolineLineLine.jpg
      MD5

      a4f08af1bbc66cfa2aa7a843677596e3

      SHA1

      6496d9a3d518a848353cc70196d8c9d4e89076af

      SHA256

      e202814d883235fc1d8b10a9bf96a6669443c6490fc959000551a4ea8311afca

      SHA512

      68c091dde8a097e39dc65051491d409ab8dc99377864553a9e03635dfb72ea8b922e79060c5fb0d7c9c9f11235a22e673145f5da665a3f51135942687440f809

    • \Users\Public\carolineLineLine.jpg
      MD5

      a4f08af1bbc66cfa2aa7a843677596e3

      SHA1

      6496d9a3d518a848353cc70196d8c9d4e89076af

      SHA256

      e202814d883235fc1d8b10a9bf96a6669443c6490fc959000551a4ea8311afca

      SHA512

      68c091dde8a097e39dc65051491d409ab8dc99377864553a9e03635dfb72ea8b922e79060c5fb0d7c9c9f11235a22e673145f5da665a3f51135942687440f809

    • memory/1080-69-0x0000000004150000-0x0000000004B85000-memory.dmp
      Filesize

      10.2MB

    • memory/1080-66-0x0000000000000000-mapping.dmp
    • memory/1156-62-0x0000000000000000-mapping.dmp
    • memory/1536-58-0x0000000000000000-mapping.dmp
    • memory/1652-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1652-54-0x0000000072101000-0x0000000072104000-memory.dmp
      Filesize

      12KB

    • memory/1652-55-0x000000006FB81000-0x000000006FB83000-memory.dmp
      Filesize

      8KB

    • memory/1652-57-0x0000000074A41000-0x0000000074A43000-memory.dmp
      Filesize

      8KB

    • memory/1652-70-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1892-61-0x000007FEFB7B1000-0x000007FEFB7B3000-memory.dmp
      Filesize

      8KB

    • memory/1892-59-0x0000000000000000-mapping.dmp