Analysis
-
max time kernel
52s -
max time network
23s -
platform
windows7_x64 -
resource
win7 -
submitted
10-07-2020 17:47
Static task
static1
Behavioral task
behavioral1
Sample
certificato-07.08.2020.doc
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
certificato-07.08.2020.doc
Resource
win10
0 signatures
0 seconds
Errors
Reason
Machine shutdown
General
-
Target
certificato-07.08.2020.doc
-
Size
147KB
-
MD5
e6524bfe307ac0e25cbefd32e562f7b5
-
SHA1
c82af405405cc21144e12c943a36ee785393c1b8
-
SHA256
859ee5d6161bb723f736f9ce868a3ab5a4cd5b4c07296239d0fcc49d7cdd8249
-
SHA512
31f0858a420c126e1011197ac54b847d2ba84845cf91ef7f0965271f4ddd78004674722d68ad3a34b3a398ffd4d4bbb52761140d473a622a83d5e69664d6506b
Score
10/10
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1068 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
WINWORD.EXEpid process 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1100 1068 regsvr32.exe WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 1068 wrote to memory of 1100 1068 WINWORD.EXE regsvr32.exe PID 1068 wrote to memory of 1100 1068 WINWORD.EXE regsvr32.exe PID 1068 wrote to memory of 1100 1068 WINWORD.EXE regsvr32.exe PID 1068 wrote to memory of 1100 1068 WINWORD.EXE regsvr32.exe PID 1068 wrote to memory of 1100 1068 WINWORD.EXE regsvr32.exe -
Office loads VBA resources, possible macro or embedded object present
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\certificato-07.08.2020.doc"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" Qo.tmp2⤵
- Process spawned unexpected child process
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1100-3-0x0000000000000000-mapping.dmp