Overview
overview
10Static
static
81c1f3eaf14...47.doc
windows7-x64
41c1f3eaf14...47.doc
windows10-2004-x64
1023e8349880...94.doc
windows7-x64
423e8349880...94.doc
windows10-2004-x64
15568d72be1...f.xlsm
windows7-x64
15568d72be1...f.xlsm
windows10-2004-x64
1b8eedd0138...3.docm
windows7-x64
10b8eedd0138...3.docm
windows10-2004-x64
10bcdf20e654...7.docm
windows7-x64
10bcdf20e654...7.docm
windows10-2004-x64
10c82717259c...2.docm
windows7-x64
10c82717259c...2.docm
windows10-2004-x64
10Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2023 10:17
Behavioral task
behavioral1
Sample
1c1f3eaf142c53480147c6e98cea4547.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1c1f3eaf142c53480147c6e98cea4547.doc
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
23e8349880dde570473345c8b6ba8d94.doc
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
23e8349880dde570473345c8b6ba8d94.doc
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
5568d72be1bdebf9187261a24b3b324f.xlsm
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
5568d72be1bdebf9187261a24b3b324f.xlsm
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
b8eedd013827b960eee4c0ae07ae5513.docm
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
b8eedd013827b960eee4c0ae07ae5513.docm
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
bcdf20e65445ed6bda794d958025e417.docm
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
bcdf20e65445ed6bda794d958025e417.docm
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
c82717259c368b69cb64572e74042c02.docm
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
c82717259c368b69cb64572e74042c02.docm
Resource
win10v2004-20230221-en
General
-
Target
1c1f3eaf142c53480147c6e98cea4547.doc
-
Size
35KB
-
MD5
1c1f3eaf142c53480147c6e98cea4547
-
SHA1
92fbb5db21194832b830e4f5c44449c582138b50
-
SHA256
42e299adf74331dc51950a2e0195d4f3230170358b362463cb1f113bc5755e6e
-
SHA512
9a3a8bce2902a5be9c26bff283968161aca0237162f30a129c97fc65b9f52aa1cb724310ff9767967e1a6e360bf36432448df0e0fd542bdc0ab2477e254de540
-
SSDEEP
384:A8iSUR/8det0Vyw/v+2iUP0jDeT1Jtl/+qTQ:i/quCTiy4eFU
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3824 1928 WScript.exe 81 -
WSHRAT payload 4 IoCs
resource yara_rule behavioral2/files/0x0006000000023141-162.dat family_wshrat behavioral2/files/0x0006000000023142-164.dat family_wshrat behavioral2/files/0x0006000000023142-166.dat family_wshrat behavioral2/files/0x0006000000023143-167.dat family_wshrat -
Blocklisted process makes network request 21 IoCs
flow pid Process 22 180 wscript.exe 23 180 wscript.exe 29 180 wscript.exe 36 180 wscript.exe 56 180 wscript.exe 70 180 wscript.exe 85 180 wscript.exe 95 180 wscript.exe 104 180 wscript.exe 113 180 wscript.exe 130 180 wscript.exe 131 180 wscript.exe 132 180 wscript.exe 133 180 wscript.exe 135 180 wscript.exe 136 180 wscript.exe 137 180 wscript.exe 138 180 wscript.exe 139 180 wscript.exe 140 180 wscript.exe 141 180 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Server.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Server.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.js\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Server = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.js\"" WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1928 WINWORD.EXE 1928 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 3824 1928 WINWORD.EXE 82 PID 1928 wrote to memory of 3824 1928 WINWORD.EXE 82 PID 3824 wrote to memory of 180 3824 WScript.exe 83 PID 3824 wrote to memory of 180 3824 WScript.exe 83
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1c1f3eaf142c53480147c6e98cea4547.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\Server.js"2⤵
- Process spawned unexpected child process
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Local\Temp\Server.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:180
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5254e40fd67e1e3b04aadfdb76610b195
SHA122341c09fe29aa58e4d474094ee96dfa7fd7f67e
SHA256c6a0b8b775a97968121c2f8db4892e609a1cbfbf05a546c81c67de7cfbe45506
SHA5122967ca09010fa0aa6ad761183c8ae5f1e9581ec7b65b6e65af3e06ad7cb669993096c7eccfb2427e7c92a0ed835e02fff5bba4a457d806a784cde6673a632e8b
-
Filesize
184KB
MD5254e40fd67e1e3b04aadfdb76610b195
SHA122341c09fe29aa58e4d474094ee96dfa7fd7f67e
SHA256c6a0b8b775a97968121c2f8db4892e609a1cbfbf05a546c81c67de7cfbe45506
SHA5122967ca09010fa0aa6ad761183c8ae5f1e9581ec7b65b6e65af3e06ad7cb669993096c7eccfb2427e7c92a0ed835e02fff5bba4a457d806a784cde6673a632e8b
-
Filesize
184KB
MD5254e40fd67e1e3b04aadfdb76610b195
SHA122341c09fe29aa58e4d474094ee96dfa7fd7f67e
SHA256c6a0b8b775a97968121c2f8db4892e609a1cbfbf05a546c81c67de7cfbe45506
SHA5122967ca09010fa0aa6ad761183c8ae5f1e9581ec7b65b6e65af3e06ad7cb669993096c7eccfb2427e7c92a0ed835e02fff5bba4a457d806a784cde6673a632e8b
-
Filesize
184KB
MD5254e40fd67e1e3b04aadfdb76610b195
SHA122341c09fe29aa58e4d474094ee96dfa7fd7f67e
SHA256c6a0b8b775a97968121c2f8db4892e609a1cbfbf05a546c81c67de7cfbe45506
SHA5122967ca09010fa0aa6ad761183c8ae5f1e9581ec7b65b6e65af3e06ad7cb669993096c7eccfb2427e7c92a0ed835e02fff5bba4a457d806a784cde6673a632e8b