Analysis
-
max time kernel
127s -
max time network
119s -
platform
windows7_x64 -
resource
win7 -
submitted
11-07-2020 07:17
Static task
static1
Behavioral task
behavioral1
Sample
file_07.20.doc
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
file_07.20.doc
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
file_07.20.doc
-
Size
147KB
-
MD5
2908546ca31c2afbb20b6fbdde284b25
-
SHA1
fb5a6054c9f66ad4c5d16e20f8aee2cca0ef98d5
-
SHA256
a76aa17b3c66f1bc861ff329710e0b94c0a9fdefa9e3c1b3e6d1d8410d85b679
-
SHA512
608a411379a00acdd3909faa68aa6c2c47739698e15bc811621dae41b09e26b42061d5ca8752958e4d03f59bd0359b78a1edb672675fa98ba45814d7fb972c7b
Score
10/10
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1072 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
WINWORD.EXEpid process 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE 1072 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1668 1072 regsvr32.exe WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 1072 wrote to memory of 1668 1072 WINWORD.EXE regsvr32.exe PID 1072 wrote to memory of 1668 1072 WINWORD.EXE regsvr32.exe PID 1072 wrote to memory of 1668 1072 WINWORD.EXE regsvr32.exe PID 1072 wrote to memory of 1668 1072 WINWORD.EXE regsvr32.exe PID 1072 wrote to memory of 1668 1072 WINWORD.EXE regsvr32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
regsvr32.exepid process 1668 regsvr32.exe -
Office loads VBA resources, possible macro or embedded object present
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\file_07.20.doc"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" ww.tmp2⤵
- Process spawned unexpected child process
- Suspicious behavior: GetForegroundWindowSpam
PID:1668
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1668-3-0x0000000000000000-mapping.dmp