Analysis

  • max time kernel
    107s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 11:54

General

  • Target

    45d044f0b47e5b2f56cd81fd9e615e2b9960cdef3a4a9c69e11d014b4bb1d32f.doc

  • Size

    191KB

  • MD5

    cf75c33403bad87a59b0161576779ba2

  • SHA1

    e4131593e9be8b994b49241cd2700479ddbfdab1

  • SHA256

    45d044f0b47e5b2f56cd81fd9e615e2b9960cdef3a4a9c69e11d014b4bb1d32f

  • SHA512

    79f9a2753e3076cd5febbdfb438c6f98c718c10190a7663c4140d9ddc635db10c4ea0981867b67f0188064a3d18b4bfcb46c1b6ac859eebc501ec1cdfe53a3a8

  • SSDEEP

    3072:yI6bftBVxtWBhOSBw3GMPfY98JfZmKP7uasFMakqYTfcIh+2oALNZCiZm8:yI6bftnxtZSBC498JzP7XsqakRTfc6+e

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.2fs.com.au/tmp/rkn.exe

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\45d044f0b47e5b2f56cd81fd9e615e2b9960cdef3a4a9c69e11d014b4bb1d32f.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\Users\Admin\AppData\Local\Temp\adobeacd-update.bat
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.2.2 -n 2
        3⤵
        • Runs ping.exe
        PID:1380
      • C:\Windows\SysWOW64\chcp.com
        chcp 1251
        3⤵
          PID:1788
        • C:\Windows\SysWOW64\cscript.exe
          cscript.exe "c:\Users\Admin\AppData\Local\Temp\adobeacd-update.vbs"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1776
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy bypass -noprofile -file C:\Users\Admin\AppData\Local\Temp\adobeacd-update.ps1
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1764
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c c:\Users\Admin\AppData\Local\Temp\444.exe
              5⤵
                PID:652
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          2⤵
            PID:1932

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Remote System Discovery

        1
        T1018

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\adobeacd-update.ps1
          Filesize

          1KB

          MD5

          c3fdf3ccaeaa6bb33165dfe18dae43e6

          SHA1

          deaf2ed146ab346cd406eccc928a14552dd15e19

          SHA256

          8606130c7a68799d185a40da2c404b2fb6dbeba6ebc7bca7751e259cec83e148

          SHA512

          102913925ca5d8d746b1f8f7cbd0a65294a2a023b7d6609aee3a962e74ae21fb1b373b70655851a27d4f2921b9559dce43f50d4a117f517f167c2ea09d4a5e9d

        • \??\c:\Users\Admin\AppData\Local\Temp\adobeacd-update.bat
          Filesize

          116B

          MD5

          4922a773060a96738c0309ff2266e9b0

          SHA1

          4b2effb130c3c0af0c0d17566ea40ddcba59a50e

          SHA256

          9d005399621525cef2397ca6ebaae4dd373781bec66d362712df8431cbdd1a03

          SHA512

          ce612df4b8516dbfd0f332b3419cc858d2ebc2211d56f75c917d4af551fa20b3936558b4e0036e57844c8865f8ed9b75c7fdf2d49c0cd2e9acf655516d9ddd04

        • \??\c:\Users\Admin\AppData\Local\Temp\adobeacd-update.vbs
          Filesize

          398B

          MD5

          f274f67c467b49b9d278ca3b4196b5d0

          SHA1

          8b80213e280bf2b40057a3b5269a540c387fd036

          SHA256

          79253c4e93bcc34576fa2f98a243241d00c7f38e91c1bebd4afc7ea41530fca1

          SHA512

          12daa3c73d16eaee755151dbc7907a4dcc8082e7896ba5333a62c4380a8e31c3b9a20b38d553abe14b491ad5ba107ccc74514548696f01daaae03b35f2b3d84b

        • memory/652-125-0x0000000000000000-mapping.dmp
        • memory/1272-85-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-66-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-58-0x0000000070BFD000-0x0000000070C08000-memory.dmp
          Filesize

          44KB

        • memory/1272-59-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-60-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-61-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-62-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-92-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-64-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-65-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-68-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-69-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-67-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-91-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-70-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-71-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-75-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-90-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-73-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-72-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-78-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-79-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-77-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-76-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-80-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-81-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-82-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-83-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-84-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-86-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
          Filesize

          64KB

        • memory/1272-93-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-63-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-57-0x0000000075601000-0x0000000075603000-memory.dmp
          Filesize

          8KB

        • memory/1272-74-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-89-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-87-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-88-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-95-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-101-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-100-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-99-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-98-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-97-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-96-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-104-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-105-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-106-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-107-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-108-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-109-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-110-0x0000000000686000-0x000000000068A000-memory.dmp
          Filesize

          16KB

        • memory/1272-111-0x0000000070BFD000-0x0000000070C08000-memory.dmp
          Filesize

          44KB

        • memory/1272-127-0x0000000070BFD000-0x0000000070C08000-memory.dmp
          Filesize

          44KB

        • memory/1272-126-0x000000005FFF0000-0x0000000060000000-memory.dmp
          Filesize

          64KB

        • memory/1272-54-0x0000000072191000-0x0000000072194000-memory.dmp
          Filesize

          12KB

        • memory/1272-55-0x000000006FC11000-0x000000006FC13000-memory.dmp
          Filesize

          8KB

        • memory/1380-103-0x0000000000000000-mapping.dmp
        • memory/1520-94-0x0000000000000000-mapping.dmp
        • memory/1764-120-0x0000000004B80000-0x00000000050B6000-memory.dmp
          Filesize

          5.2MB

        • memory/1764-118-0x0000000069FF0000-0x000000006A59B000-memory.dmp
          Filesize

          5.7MB

        • memory/1764-124-0x0000000069FF0000-0x000000006A59B000-memory.dmp
          Filesize

          5.7MB

        • memory/1764-116-0x0000000000000000-mapping.dmp
        • memory/1776-113-0x0000000000000000-mapping.dmp
        • memory/1788-112-0x0000000000000000-mapping.dmp
        • memory/1932-122-0x0000000000000000-mapping.dmp
        • memory/1932-123-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp
          Filesize

          8KB