Analysis
-
max time kernel
139s -
max time network
134s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
15/07/2020, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
order,07.14.2020.doc
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
order,07.14.2020.doc
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
order,07.14.2020.doc
-
Size
114KB
-
MD5
bd8f7bfdceb8a27a8e9e27486be8156f
-
SHA1
2d610fc37f73e37d99a2f363759abdb616006329
-
SHA256
db86431d984efcabaa6645e31eb1fe9bc8ba3b5cf5b80f4eff9306c792301473
-
SHA512
b25f16220cf8a24d721a15e9deb6bfd8bd23077225e4c86c3b4e2fb074ab0f4dd2933916a9b4d5ac94fa37909840ae8dbd1675708416073dc797973602ef6daf
Score
10/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE 2416 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2416 WINWORD.EXE 2416 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3864 2416 regsvr32.exe 67 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2416 wrote to memory of 3864 2416 WINWORD.EXE 71 PID 2416 wrote to memory of 3864 2416 WINWORD.EXE 71 PID 3864 wrote to memory of 632 3864 regsvr32.exe 72 PID 3864 wrote to memory of 632 3864 regsvr32.exe 72 PID 3864 wrote to memory of 632 3864 regsvr32.exe 72 -
Loads dropped DLL 1 IoCs
pid Process 632 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 632 regsvr32.exe 632 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\order,07.14.2020.doc" /o ""1⤵
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
PID:2416 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 q4.tmp2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\regsvr32.exeq4.tmp3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-