Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    30-01-2023 22:32

General

  • Target

    baddoc.doc

  • Size

    62KB

  • MD5

    a3b613d128aace09241504e8acc678c2

  • SHA1

    edde71ccadfad1380b881da5ecafc77fba5885b8

  • SHA256

    8b92c23b29422131acc150fa1ebac67e1b0b0f8cfc1b727805b842a88de447de

  • SHA512

    cef74b5b9fb3c4dba72650401dfe31b059db239a3248e1c9b91ab7f95907080d1b6258b32e4817184540129339f60c95f4e9e991d115e8414aea3b108eaf8dec

  • SSDEEP

    768:+0MGUUTYQin+b4C7UqCVuO1BtWmxzdrZUIdjXgAmxZp2j5s2p:+0MGUUTYQic8qS1XndrZf8pMV

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://91.220.131.44/upd/install.exe

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\baddoc.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\Users\Admin\AppData\Local\Temp\adobeacd-update.bat
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\system32\PING.EXE
        ping 1.1.2.2 -n 2
        3⤵
        • Runs ping.exe
        PID:3652
      • C:\Windows\system32\chcp.com
        chcp 1251
        3⤵
          PID:4264
        • C:\Windows\system32\cscript.exe
          cscript.exe "c:\Users\Admin\AppData\Local\Temp\adobeacd-update"".""v""bs"
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4988
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy bypass -noprofile -file C:\Users\Admin\AppData\Local\Temp\adobeacd-update.ps1
            4⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2812
            • C:\Windows\system32\cmd.exe
              "C:\Windows\system32\cmd.exe" /c c:\Users\Admin\AppData\Local\Temp\444.exe
              5⤵
                PID:1500

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      4
      T1082

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\adobeacd-update.ps1
        Filesize

        1KB

        MD5

        f4e07dbef9faa1cb3b47cac04f06b094

        SHA1

        aa8acb13858c2d9979f76e88759b43e43919669a

        SHA256

        90af729d2d78dccb4ac1aeaa24ea50fa13cc54a883bad6de05bbf33d90577f0d

        SHA512

        dd02098ff345875b25c94a6bfa4481c36bfd41cf5d0868715719bd6952cebca990881aacccba9da0a581b36725201da88f28d356de40179953f06a78742f59ec

      • \??\c:\Users\Admin\AppData\Local\Temp\adobeacd-update.bat
        Filesize

        207B

        MD5

        bcee45f249102dd87bc0445925e1dc65

        SHA1

        5652e6a5aa3178329def77f50e54529997e0cfad

        SHA256

        84b6d24219105e86f42329300278bbefa03ff6b40116123f3d19ff3c20f6ec9a

        SHA512

        c6290cc42bc452ce9d4bd284909da7f735d571dedf98e55809c1d91b0272db2a09e76865f2f476a7a2a1833126920ed7f2f9fab5d400bf2d0fb0ff381b432480

      • \??\c:\Users\Admin\AppData\Local\Temp\adobeacd-update.vbs
        Filesize

        357B

        MD5

        4595af11d7e8f623a9c1c3169d9bf20c

        SHA1

        11874e9d2ecada1b01dd1d05a8aa835bd4a31714

        SHA256

        4ed9c705449ec3a1a2afd425b478ae80d339c03498eb56dc19d7516fd9cadded

        SHA512

        b4a6edff072d77f389da0e93ad834e54e7c4e078cc3c2344ea939730720d8305dc72324d4b791ea0bb833724df9f96d7facd26970c74be8d5b0ee3bafe735cf3

      • memory/1500-156-0x0000000000000000-mapping.dmp
      • memory/1928-140-0x0000000000000000-mapping.dmp
      • memory/2812-146-0x0000000000000000-mapping.dmp
      • memory/2812-149-0x0000026E10700000-0x0000026E10710000-memory.dmp
        Filesize

        64KB

      • memory/2812-157-0x0000026E29050000-0x0000026E290C6000-memory.dmp
        Filesize

        472KB

      • memory/2812-155-0x0000026E28F50000-0x0000026E28F90000-memory.dmp
        Filesize

        256KB

      • memory/2812-154-0x00007FFFC2D00000-0x00007FFFC37C1000-memory.dmp
        Filesize

        10.8MB

      • memory/2812-152-0x0000026E28D50000-0x0000026E28D94000-memory.dmp
        Filesize

        272KB

      • memory/2812-151-0x00007FFFC2D00000-0x00007FFFC37C1000-memory.dmp
        Filesize

        10.8MB

      • memory/2812-150-0x0000026E29160000-0x0000026E29262000-memory.dmp
        Filesize

        1.0MB

      • memory/2812-147-0x0000026E28DC0000-0x0000026E28E42000-memory.dmp
        Filesize

        520KB

      • memory/2812-148-0x0000026E10BC0000-0x0000026E10BE2000-memory.dmp
        Filesize

        136KB

      • memory/3652-142-0x0000000000000000-mapping.dmp
      • memory/4264-143-0x0000000000000000-mapping.dmp
      • memory/4460-134-0x00007FFFAF1F0000-0x00007FFFAF200000-memory.dmp
        Filesize

        64KB

      • memory/4460-132-0x00007FFFAF1F0000-0x00007FFFAF200000-memory.dmp
        Filesize

        64KB

      • memory/4460-135-0x00007FFFAF1F0000-0x00007FFFAF200000-memory.dmp
        Filesize

        64KB

      • memory/4460-133-0x00007FFFAF1F0000-0x00007FFFAF200000-memory.dmp
        Filesize

        64KB

      • memory/4460-136-0x00007FFFAF1F0000-0x00007FFFAF200000-memory.dmp
        Filesize

        64KB

      • memory/4460-137-0x00007FFFAD0B0000-0x00007FFFAD0C0000-memory.dmp
        Filesize

        64KB

      • memory/4460-138-0x00007FFFAD0B0000-0x00007FFFAD0C0000-memory.dmp
        Filesize

        64KB

      • memory/4460-139-0x000001AED7D70000-0x000001AED7D74000-memory.dmp
        Filesize

        16KB

      • memory/4460-159-0x00007FFFAF1F0000-0x00007FFFAF200000-memory.dmp
        Filesize

        64KB

      • memory/4460-160-0x00007FFFAF1F0000-0x00007FFFAF200000-memory.dmp
        Filesize

        64KB

      • memory/4460-161-0x00007FFFAF1F0000-0x00007FFFAF200000-memory.dmp
        Filesize

        64KB

      • memory/4460-162-0x00007FFFAF1F0000-0x00007FFFAF200000-memory.dmp
        Filesize

        64KB

      • memory/4988-144-0x0000000000000000-mapping.dmp