Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows10_x64 -
resource
win10 -
submitted
15-07-2020 08:26
Static task
static1
Behavioral task
behavioral1
Sample
files.07.20.doc
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
files.07.20.doc
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
files.07.20.doc
-
Size
113KB
-
MD5
92a40c2f9e0bf1e05363dda2f4e69d02
-
SHA1
7237b18aef7d35c08ebc46be5399f35d2f745ab5
-
SHA256
b7f2dddd27a7118f6f6cc3923f2af1f83ca5b8ea722ea05f6b27845469899c67
-
SHA512
f9146ddc08cf85c510bda54c8996b8f3d74ab7b92ade0b5d160094b561eb4b2a93e149aa336bdfb2bc10a814583e466e82d2ae253489fe21c5bee7e960b9e353
Score
10/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2728 WINWORD.EXE 2728 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 736 2728 regsvr32.exe 66 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2728 wrote to memory of 736 2728 WINWORD.EXE 71 PID 2728 wrote to memory of 736 2728 WINWORD.EXE 71 PID 736 wrote to memory of 412 736 regsvr32.exe 72 PID 736 wrote to memory of 412 736 regsvr32.exe 72 PID 736 wrote to memory of 412 736 regsvr32.exe 72 -
Loads dropped DLL 1 IoCs
pid Process 412 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 412 regsvr32.exe 412 regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\files.07.20.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 nl.tmp2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\regsvr32.exenl.tmp3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-