Analysis

  • max time kernel
    134s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 07:22

General

  • Target

    3d0c3f3d464a8229480b6d4a024d2982c72d67942d8ee245dd91da1a26ddd22a.doc

  • Size

    670KB

  • MD5

    dfcdb189eafa87b66861d3d110e17f7a

  • SHA1

    c05d97f19fe2defb98bad06fcfbc2af447f7e921

  • SHA256

    3d0c3f3d464a8229480b6d4a024d2982c72d67942d8ee245dd91da1a26ddd22a

  • SHA512

    fdaa7f8fa5276abff70a7bb0b21136e0d6780d5288cda5cc778719c54a26167db50ee16ded04c7be8ee04368d8f1ad4f1bb3ab6a427e1a6d8dc8c85d3b129a25

Malware Config

Signatures

  • Ostap JavaScript Downloader 1 IoCs

    Ostap is a JavaScript downloader that's been active since 2016. It's used to deliver several families, inluding TrickBot

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ostap

    Ostap is a JS downloader, used to deliver other families.

  • Sets service image path in registry 2 TTPs
  • Contains header used in .cmd/.bat files for embedding JavaScript code 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3d0c3f3d464a8229480b6d4a024d2982c72d67942d8ee245dd91da1a26ddd22a.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2736
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\3d0c3f3d464a8229480b6d4a024d2982c72d67942d8ee245dd91da1a26ddd22a.doc260.bat" "
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:4816
        • C:\Windows\system32\wscript.exe
          wscript /e:JSCript "C:\Users\Admin\AppData\Roaming\3d0c3f3d464a8229480b6d4a024d2982c72d67942d8ee245dd91da1a26ddd22a.doc260.bat"
          3⤵
            PID:4596
      • C:\Windows\System32\WaaSMedicAgent.exe
        C:\Windows\System32\WaaSMedicAgent.exe 3fb88505fb666e5aafc898c2952ee4c0 seL3WnZAdUG983ZOn3PCHg.0.1.0.0.0
        1⤵
        • Modifies data under HKEY_USERS
        PID:1388
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
        1⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:1876

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\3d0c3f3d464a8229480b6d4a024d2982c72d67942d8ee245dd91da1a26ddd22a.doc260.bat

        MD5

        05617edf8370a047adf08327e96794a1

        SHA1

        6c619797acd29659e5422e8b6f4917ec7527b156

        SHA256

        0457a85a8a91f25ff5d2751c7b3bec443ff138c6624b4e6b3643560eb9f193eb

        SHA512

        faec7790a8c81a69853dc46101fb71462a96858ce85db873547dacffd405e4754e3331c2c818a1dfe3540801dfa0d0a9e48ec5d4f4daf6f88a67dee6e1b7c9f6

      • memory/1876-136-0x000001915D3A0000-0x000001915D3B0000-memory.dmp

        Filesize

        64KB

      • memory/1876-143-0x0000019160020000-0x0000019160024000-memory.dmp

        Filesize

        16KB

      • memory/3148-132-0x00007FFC21630000-0x00007FFC21640000-memory.dmp

        Filesize

        64KB

      • memory/3148-133-0x00007FFC21630000-0x00007FFC21640000-memory.dmp

        Filesize

        64KB

      • memory/3148-134-0x00007FFC21630000-0x00007FFC21640000-memory.dmp

        Filesize

        64KB

      • memory/3148-135-0x00007FFC1F460000-0x00007FFC1F470000-memory.dmp

        Filesize

        64KB

      • memory/3148-130-0x00007FFC21630000-0x00007FFC21640000-memory.dmp

        Filesize

        64KB

      • memory/3148-144-0x00007FFC1F460000-0x00007FFC1F470000-memory.dmp

        Filesize

        64KB

      • memory/3148-131-0x00007FFC21630000-0x00007FFC21640000-memory.dmp

        Filesize

        64KB

      • memory/3148-250-0x00007FFC21630000-0x00007FFC21640000-memory.dmp

        Filesize

        64KB

      • memory/3148-251-0x00007FFC21630000-0x00007FFC21640000-memory.dmp

        Filesize

        64KB

      • memory/3148-252-0x00007FFC21630000-0x00007FFC21640000-memory.dmp

        Filesize

        64KB

      • memory/3148-253-0x00007FFC21630000-0x00007FFC21640000-memory.dmp

        Filesize

        64KB