Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
07-12-2020 15:04
Static task
static1
Behavioral task
behavioral1
Sample
instrument indenture_12.20.doc
Resource
win7v20201028
General
-
Target
instrument indenture_12.20.doc
-
Size
74KB
-
MD5
9afbe47292bfd00a63dab5ab0e566a36
-
SHA1
1e34087c2729ebe48d5022dc4eec1cf5eb07e8aa
-
SHA256
64de1f3425d0aa59ad9c6b59a2e7f0510248458c6bbf7755d7770030438a31cc
-
SHA512
614489eb44b42f119e7205042cb7619cedf3d87395bb7f30bf1d30ca9b1a30252508c2d09a0f0c17e870b8378e7bddb4fc37563e16d1b6f8657ba601ebdc7330
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3824 4640 rundll32.exe WINWORD.EXE -
Blocklisted process makes network request 8 IoCs
Processes:
mshta.exerundll32.exeflow pid process 14 4184 mshta.exe 27 580 rundll32.exe 29 580 rundll32.exe 31 580 rundll32.exe 33 580 rundll32.exe 35 580 rundll32.exe 37 580 rundll32.exe 38 580 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 580 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4640 WINWORD.EXE 4640 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 580 rundll32.exe 580 rundll32.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
WINWORD.EXEpid process 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
WINWORD.EXErundll32.exemshta.exedescription pid process target process PID 4640 wrote to memory of 3824 4640 WINWORD.EXE rundll32.exe PID 4640 wrote to memory of 3824 4640 WINWORD.EXE rundll32.exe PID 3824 wrote to memory of 4184 3824 rundll32.exe mshta.exe PID 3824 wrote to memory of 4184 3824 rundll32.exe mshta.exe PID 3824 wrote to memory of 4184 3824 rundll32.exe mshta.exe PID 4184 wrote to memory of 580 4184 mshta.exe rundll32.exe PID 4184 wrote to memory of 580 4184 mshta.exe rundll32.exe PID 4184 wrote to memory of 580 4184 mshta.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\instrument indenture_12.20.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" url.dll,OpenURL c:\users\public\index.hta2⤵
- Process spawned unexpected child process
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\index.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" c:\programdata\aSF9P.pdf,ShowDialogA -r4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
16d4ed03d9bb2ed8edd29daeb0f25e9f
SHA187104e1373d4dc62c22bac22d8c4b29f19be7280
SHA2565a84c9213268178c70df6dfdcc2b71e3b1316f891e8b62d4d0528150b999b3fc
SHA5124aa01548dc81c6bf98040c43deb786df41282337c7ec6f3b5b0d9812654e615801bef6f05f7c4e892be4f6e29ea41447e0158bcf721b6c41ba98ca29f49d6894
-
MD5
55a67d831641e2794749f79bb5dc6cc0
SHA1f08e04421956eeb859c81472e5a99ef1a4cf58d8
SHA25634c51f11835d890863fd0af27888bda91467f57607540e6cd70e547c27bde683
SHA51280d955796c1ed3eeb97dd017f941054b835fc6bca47a131f40e599a9675f1a1d84886fcb032fec087c47dbf976cdacdb09f2f0f3a117851f2d5ec9462fcb1d6b
-
MD5
55a67d831641e2794749f79bb5dc6cc0
SHA1f08e04421956eeb859c81472e5a99ef1a4cf58d8
SHA25634c51f11835d890863fd0af27888bda91467f57607540e6cd70e547c27bde683
SHA51280d955796c1ed3eeb97dd017f941054b835fc6bca47a131f40e599a9675f1a1d84886fcb032fec087c47dbf976cdacdb09f2f0f3a117851f2d5ec9462fcb1d6b