Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-12-2020 13:08
Static task
static1
Behavioral task
behavioral1
Sample
prescrivere 12.20.doc
Resource
win7v20201028
General
-
Target
prescrivere 12.20.doc
-
Size
145KB
-
MD5
b53e10e01be1eff9f160d798c7292058
-
SHA1
3f553e215de6b65fad42346d5891482a17d53555
-
SHA256
e5cb6bf749b22e4232541bdd75087559bcba643bed551040ec74a561d8de259d
-
SHA512
e5a454a96e047a84df1778bb38cf271f32484d84a3bcd8125d4ad687c9650abb4237b1f572b1a878e101efadfffe47dbffb6924e795d3a387336a30fb717575d
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 208 500 regsvr32.exe WINWORD.EXE -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 3476 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Processes:
iexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000c5fae9aca10386ad44803f926e68d47873b1af48350035107aa9fc05a362f576000000000e8000000002000020000000456796cba46d72cf83d0159a9229ab0bb51ccc89151703b080d03af82779289e20000000ded234b300d619460e27094c6959652e19f5a096a2f611d4b091a392e53f6dba4000000083d17b65d0a9a00e4d8541ca09cb9950281f105e2df72132077b1de1adf45d202a359a70f479b2ce559b714ff72a2ea15c1f15a1f4c967429137247c29cded5b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1752033883" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ed8e737dc9d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B77432E6-3570-11EB-B59A-CA79033726AB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a000000000200000000001066000000010000200000001f913433f3fcb6c0146f22f81ad9d02bfb199bba0f2cb912b26e2424cbb482fd000000000e8000000002000020000000b03a98a09e64309e9e58f3eea652aa12bd3ed3863ab75b001cf1fedf2827d2c320000000f6584e05f3e3a4a9771ad078711ab0d504fd58585e5ea47ba5e521f6681874844000000047985acf858389626fc9ae9df0f0d050a64f3fd14eab1bf8c015f30f1f03e1e713f1845e651a5086bd2c9d18357d6becafa13c6f9cd3b8967a770c31b991056a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4794AF4-3570-11EB-B59A-CA79033726AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a000000000200000000001066000000010000200000000e998ef26e347458f8aceea5ef7da8d39605e1f042e0fd36198b747c6a4decdd000000000e8000000002000020000000885ffc845aebd4c6fc8b5f0ac9e956a5b7ce2c2e4a30f36854b1e3c90ef527e3200000006800954f6ae895eda56d736ef5ebd82ffe73662f7f80a372672ec188722ea4e540000000a4f2c4fd8834e7486490dc695dc4db3261ac4ea393554ae579880ec934fd8a6d2d453569f122fa309e72c581e76addcf9903001031cee1aad8d0501357b3536d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30459d737dc9d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30853501" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93FD3BE5-3570-11EB-B59A-CA79033726AB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30853501" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004d737a7dc9d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a000000000200000000001066000000010000200000005a8c12dfc66cbd6241d079991581116160952d33d3eb96a926f9a039caf19cfd000000000e8000000002000020000000b763458ead2c37df72e13a3433bc70b20916052d63e8f0cbb3ff7187da6be4ca2000000005bde7c84c97c4365bc2b95036775d281ccd8bf0716211203320108fec1bccc3400000006cb3d82ab828e166d8daee83ab05968d27e28584137312cc935bdc6167377eed546bfda7ac0aa7d9f95ef8b70d17bd74a31a597cdc5dddbead050de65989dc10 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c7cb8f7dc9d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1752033883" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 24 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 500 WINWORD.EXE 500 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exepid process 3804 iexplore.exe 2264 iexplore.exe 724 iexplore.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
Processes:
WINWORD.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 500 WINWORD.EXE 3804 iexplore.exe 3804 iexplore.exe 644 IEXPLORE.EXE 644 IEXPLORE.EXE 2264 iexplore.exe 2264 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 724 iexplore.exe 724 iexplore.exe 3592 IEXPLORE.EXE 3592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
WINWORD.EXEregsvr32.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 500 wrote to memory of 208 500 WINWORD.EXE regsvr32.exe PID 500 wrote to memory of 208 500 WINWORD.EXE regsvr32.exe PID 208 wrote to memory of 3476 208 regsvr32.exe regsvr32.exe PID 208 wrote to memory of 3476 208 regsvr32.exe regsvr32.exe PID 208 wrote to memory of 3476 208 regsvr32.exe regsvr32.exe PID 3804 wrote to memory of 644 3804 iexplore.exe IEXPLORE.EXE PID 3804 wrote to memory of 644 3804 iexplore.exe IEXPLORE.EXE PID 3804 wrote to memory of 644 3804 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2860 2264 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2860 2264 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2860 2264 iexplore.exe IEXPLORE.EXE PID 724 wrote to memory of 3592 724 iexplore.exe IEXPLORE.EXE PID 724 wrote to memory of 3592 724 iexplore.exe IEXPLORE.EXE PID 724 wrote to memory of 3592 724 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\prescrivere 12.20.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 c:\programdata\GsXVM.pdf2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exec:\programdata\GsXVM.pdf3⤵
- Loads dropped DLL
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3804 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:724 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\c:\programdata\GsXVM.pdfMD5
077f36d2ffcf5ee8c2c240f73327d45d
SHA1521d1b499a7039c4cc792b612c12bf17c81f5823
SHA256f48cd2a30ec043340a606a7ae60fbb91a7fd938be937ff08a10463734f89adc4
SHA512aabe08bd5c849e08886916191f45384454c2f372c67f2fd3e2b8a83cd91ccf0dc48f2273838564cb02ba4d033a9fb8fd811e9371c1d0ac2713a4674493f1b62c
-
\ProgramData\GsXVM.pdfMD5
077f36d2ffcf5ee8c2c240f73327d45d
SHA1521d1b499a7039c4cc792b612c12bf17c81f5823
SHA256f48cd2a30ec043340a606a7ae60fbb91a7fd938be937ff08a10463734f89adc4
SHA512aabe08bd5c849e08886916191f45384454c2f372c67f2fd3e2b8a83cd91ccf0dc48f2273838564cb02ba4d033a9fb8fd811e9371c1d0ac2713a4674493f1b62c
-
memory/208-8-0x0000000000000000-mapping.dmp
-
memory/500-2-0x000001B1F6290000-0x000001B1F68C7000-memory.dmpFilesize
6.2MB
-
memory/500-3-0x000001B181BA3000-0x000001B181BA8000-memory.dmpFilesize
20KB
-
memory/644-12-0x0000000000000000-mapping.dmp
-
memory/2860-13-0x0000000000000000-mapping.dmp
-
memory/3476-10-0x0000000000000000-mapping.dmp
-
memory/3592-14-0x0000000000000000-mapping.dmp