Analysis

  • max time kernel
    410s
  • max time network
    357s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    05-11-2021 10:04

General

  • Target

    PencilCry.exe

  • Size

    658KB

  • MD5

    c564bd5efd4a6d3af67e716914b994a4

  • SHA1

    adcb25f8a8942d9e4f0a355eef1037e9458432b8

  • SHA256

    77ec792277dc21124e9db5776d3a36a4a65edc1f8d2ab5b0a7af19db051e4381

  • SHA512

    6bc7a0b28f73191476fa34abdc07e6cdd7dce43baba3f590bb6f00853dbdbba5b49580f47dd44d2ea9321988ec7474414438155f444dbc0431877ea39b36838b

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PencilCry.exe
    "C:\Users\Admin\AppData\Local\Temp\PencilCry.exe"
    1⤵
      PID:2024
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1900
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x1d0
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1464
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ConvertSend.rtf"
        1⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:1164
      • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde /n
        1⤵
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:1600

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1164-66-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1164-62-0x000000006F201000-0x000000006F204000-memory.dmp
        Filesize

        12KB

      • memory/1164-63-0x000000006CAD1000-0x000000006CAD3000-memory.dmp
        Filesize

        8KB

      • memory/1164-64-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1600-67-0x000000002F081000-0x000000002F084000-memory.dmp
        Filesize

        12KB

      • memory/1600-68-0x000000006DAC1000-0x000000006DAC3000-memory.dmp
        Filesize

        8KB

      • memory/1600-69-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1900-60-0x000007FEFC4B1000-0x000007FEFC4B3000-memory.dmp
        Filesize

        8KB

      • memory/2024-57-0x0000000075D41000-0x0000000075D43000-memory.dmp
        Filesize

        8KB

      • memory/2024-58-0x0000000004C90000-0x0000000004C91000-memory.dmp
        Filesize

        4KB

      • memory/2024-59-0x0000000004C95000-0x0000000004CA6000-memory.dmp
        Filesize

        68KB

      • memory/2024-61-0x0000000004CA6000-0x0000000004CA7000-memory.dmp
        Filesize

        4KB

      • memory/2024-55-0x0000000001250000-0x0000000001251000-memory.dmp
        Filesize

        4KB