Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows10_x64 -
resource
win10 -
submitted
15-07-2020 08:31
Static task
static1
Behavioral task
behavioral1
Sample
legislate.07.20.doc
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
legislate.07.20.doc
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
legislate.07.20.doc
-
Size
113KB
-
MD5
b061e160aa9d083cb5ac44adbd33e160
-
SHA1
cdfd893d22869810969dc5bd42ac147e1d1a1051
-
SHA256
6c21170ee4c310fad7a989bae8c08f591f0648c4099822d7931efbbaec99fa39
-
SHA512
f59b65737ba654fefded6bc3fe279e6db29b4e52dcb0481b0bd191f191bb36bf833b695c4b6ee3c1c14435c6423f30aeedfe5b5112262425c3212d86db5157ce
Score
10/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE 3076 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3076 WINWORD.EXE 3076 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 508 3076 regsvr32.exe 66 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3076 wrote to memory of 508 3076 WINWORD.EXE 71 PID 3076 wrote to memory of 508 3076 WINWORD.EXE 71 PID 508 wrote to memory of 640 508 regsvr32.exe 72 PID 508 wrote to memory of 640 508 regsvr32.exe 72 PID 508 wrote to memory of 640 508 regsvr32.exe 72 -
Loads dropped DLL 1 IoCs
pid Process 640 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 640 regsvr32.exe 640 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\legislate.07.20.doc" /o ""1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
PID:3076 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 Mb.tmp2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\regsvr32.exeMb.tmp3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-