Analysis
-
max time kernel
137s -
max time network
134s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
15-07-2020 08:30
Static task
static1
Behavioral task
behavioral1
Sample
intelligence.07.20.doc
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
intelligence.07.20.doc
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
intelligence.07.20.doc
-
Size
114KB
-
MD5
31d82f84272d8dfd22f57694faa2cb0b
-
SHA1
73c7451375e7014bcd5f239412a7030428c39f26
-
SHA256
bb9b7bf7e2fdefe4fcb05e44f267239955d6c75db7ebf1d6b9926b8e4b1f3330
-
SHA512
fbd0e09176957868de9a4814ff47c3eb50aa27830c9ca63f08fd7693f946c2387020fbea6acb2b4057712d632162ec27f100c4adbdfbcb8e53ab83a749b4a97e
Score
10/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3308 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3308 regsvr32.exe 3308 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE 1500 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1500 WINWORD.EXE 1500 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1204 1500 regsvr32.exe 67 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1204 1500 WINWORD.EXE 73 PID 1500 wrote to memory of 1204 1500 WINWORD.EXE 73 PID 1204 wrote to memory of 3308 1204 regsvr32.exe 74 PID 1204 wrote to memory of 3308 1204 regsvr32.exe 74 PID 1204 wrote to memory of 3308 1204 regsvr32.exe 74
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\intelligence.07.20.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 lV.tmp2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\regsvr32.exelV.tmp3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-