Analysis

  • max time kernel
    148s
  • max time network
    77s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    09-07-2020 15:06

General

  • Target

    nix4e_com_ursnif.doc

  • Size

    132KB

  • MD5

    80cfa4babf4a24cdd752ea920b409adc

  • SHA1

    90669c6e3c86881facbb3ad6d44d7509b08116fb

  • SHA256

    fed5b5e20c6b7704573865320c3ba2d3e41844747ec4cf21cece347997b7a10e

  • SHA512

    2fbb2068519cf5425013ecb21e0c0741b195f8159ac97aa960835f1b9ebe78b3b9970322c33424e701ed4d5516eb345a2b868d20531f58a27ce484d99e0973c1

Score
10/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\nix4e_com_ursnif.doc"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Windows\system32\regsvr32.exe
      regsvr32 c:\programdata\19165.jpg
      2⤵
      • Process spawned unexpected child process
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1540

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads