Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows10_x64 -
resource
win10 -
submitted
15/07/2020, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
commerce .07.20.doc
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
commerce .07.20.doc
Resource
win10
0 signatures
0 seconds
General
-
Target
commerce .07.20.doc
-
Size
113KB
-
MD5
0a06de4d1e1a09df9ef0936abaa91155
-
SHA1
3fbd6f8b88606a56c038afd8aae4f83b3230b960
-
SHA256
b2303e5ce1a67a85d66031163421fdb221a021fda89d21a1dba1b448acfae8eb
-
SHA512
2400fa4ad0cb5f4b291a15f19ed6b53ba9d53044bf6efdef17e46b5e0830386922f6483b9ee13d340ca38faed3d87229d1a3212ce36f6337f4c1e1d4dd1fefb0
Score
10/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1712 regsvr32.exe 1712 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE 3840 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3840 WINWORD.EXE 3840 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3892 3840 regsvr32.exe 66 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3840 wrote to memory of 3892 3840 WINWORD.EXE 71 PID 3840 wrote to memory of 3892 3840 WINWORD.EXE 71 PID 3892 wrote to memory of 1712 3892 regsvr32.exe 72 PID 3892 wrote to memory of 1712 3892 regsvr32.exe 72 PID 3892 wrote to memory of 1712 3892 regsvr32.exe 72 -
Loads dropped DLL 1 IoCs
pid Process 1712 regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\commerce .07.20.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 E5.tmp2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\regsvr32.exeE5.tmp3⤵
- Suspicious behavior: EnumeratesProcesses
- Loads dropped DLL
PID:1712
-
-