Resubmissions
07-09-2020 14:49
200907-6g4j1lsg4a 807-09-2020 14:46
200907-621166mbea 807-09-2020 14:43
200907-arlway4y22 807-09-2020 14:40
200907-2gfycfzzsn 807-09-2020 14:37
200907-48ed1pf1qa 807-09-2020 14:30
200907-nrhrd8w9xa 807-09-2020 14:27
200907-7xkbfnkxne 807-09-2020 13:24
200907-hmxpvsyqqx 807-09-2020 13:22
200907-y2l4q28146 807-09-2020 13:19
200907-snqv561r56 8Analysis
-
max time kernel
139s -
max time network
137s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
07-09-2020 14:49
Static task
static1
Behavioral task
behavioral1
Sample
HRCComplaintProcedureForm (7).doc
Resource
win7
Behavioral task
behavioral2
Sample
HRCComplaintProcedureForm (7).doc
Resource
win10v200722
General
-
Target
HRCComplaintProcedureForm (7).doc
-
Size
80KB
-
MD5
a411bb05ee4192202c88efdbd54552db
-
SHA1
6b0acf8175d39a1008bf9fb0d3c45bb63a3361e9
-
SHA256
33a24ad4b225880bee5c9d40527022ea020daf2f6d7643269f4f739b3271f5de
-
SHA512
6e424b2c2a7881d4969ddfaef595822f3d987e8fc49f578118c6d4ba25461ef53613405394f4ac366606ecfda08ede4d22f436f182aaee82ba9b5f7962cce6f4
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies data under HKEY_USERS 5 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = 93aea46f3685d601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 956 WINWORD.EXE 956 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 2300 svchost.exe Token: SeCreatePagefilePrivilege 2300 svchost.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
WINWORD.EXEpid process 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\HRCComplaintProcedureForm (7).doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/956-0-0x00007FF9D72B0000-0x00007FF9D7976000-memory.dmpFilesize
6.8MB