Analysis
-
max time kernel
148s -
max time network
77s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
09/07/2020, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
nix4e_com_ursnif.doc
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
nix4e_com_ursnif.doc
Resource
win10
0 signatures
0 seconds
General
-
Target
nix4e_com_ursnif.doc
-
Size
132KB
-
MD5
80cfa4babf4a24cdd752ea920b409adc
-
SHA1
90669c6e3c86881facbb3ad6d44d7509b08116fb
-
SHA256
fed5b5e20c6b7704573865320c3ba2d3e41844747ec4cf21cece347997b7a10e
-
SHA512
2fbb2068519cf5425013ecb21e0c0741b195f8159ac97aa960835f1b9ebe78b3b9970322c33424e701ed4d5516eb345a2b868d20531f58a27ce484d99e0973c1
Score
10/10
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1296 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE 1296 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1540 1296 regsvr32.exe 23 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1540 1296 WINWORD.EXE 26 PID 1296 wrote to memory of 1540 1296 WINWORD.EXE 26 PID 1296 wrote to memory of 1540 1296 WINWORD.EXE 26 PID 1296 wrote to memory of 1540 1296 WINWORD.EXE 26 PID 1296 wrote to memory of 1540 1296 WINWORD.EXE 26 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1540 regsvr32.exe -
Office loads VBA resources, possible macro or embedded object present
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\nix4e_com_ursnif.doc"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\regsvr32.exeregsvr32 c:\programdata\19165.jpg2⤵
- Process spawned unexpected child process
- Suspicious behavior: GetForegroundWindowSpam
PID:1540
-