Analysis
-
max time kernel
106s -
max time network
64s -
platform
windows7_x64 -
resource
win7 -
submitted
11/07/2020, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
ordinare 07.08.2020.doc
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ordinare 07.08.2020.doc
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
ordinare 07.08.2020.doc
-
Size
147KB
-
MD5
10cb72a11b08464287de4f6386aa1804
-
SHA1
79fd474a39128136b5d056c2e52d4d573d59a330
-
SHA256
d21916b27b5efdd803201119c97e5318019fff9715a428ec3ca7ded7c86e6e4c
-
SHA512
92febdea66347122623e346466367b23deda4c4947a590466ff6730154b2743cb1f237cf7cd4915af1e0ca0c993133cfc615c1b6c0224cd342e7e3d6b2776361
Score
10/10
Malware Config
Signatures
-
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 616 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE 616 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1532 616 regsvr32.exe 23 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 616 wrote to memory of 1532 616 WINWORD.EXE 26 PID 616 wrote to memory of 1532 616 WINWORD.EXE 26 PID 616 wrote to memory of 1532 616 WINWORD.EXE 26 PID 616 wrote to memory of 1532 616 WINWORD.EXE 26 PID 616 wrote to memory of 1532 616 WINWORD.EXE 26 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1532 regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ordinare 07.08.2020.doc"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" V0.tmp2⤵
- Process spawned unexpected child process
- Suspicious behavior: GetForegroundWindowSpam
PID:1532
-