Analysis

  • max time kernel
    141s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12-01-2021 20:14

General

  • Target

    0112_37832604.doc

  • Size

    735KB

  • MD5

    41b0f11eceaf9c2edf412e2562b7292a

  • SHA1

    194e84aa15365ecb82c83b6fab156f743a106b42

  • SHA256

    b1502cdbb5aeee57d0a5d38945c64855ba35c25d43a71bd72c3cf31665e5aa62

  • SHA512

    ddf30d9f4876f9ea3920377a21e0fba80646ad35ef189bbf41695c01166dacc41e221622c83d376939087f03f155c3c835f5a5b371481767f9cefb6c6fecac73

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0112_37832604.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3172
      • C:\Windows\System32\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll,DllUnregisterServer
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll,DllUnregisterServer
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:3836
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 1352
            4⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3960

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll

      MD5

      1d52252cdbee03a732bc4951fc5639e9

      SHA1

      8c52016953aef6e2ee56013218c40dfe008c0f98

      SHA256

      372da9447db4ca966a6a9fd45f12519637a562953a88b6d92fb26d3699c14799

      SHA512

      abcd7f2529a3ea4e5ac1c4d7864e0974d7cc2df576fbc8c3756e7251a0307ec0f3f9948876786ec31ed9752fb4482f4abf8268dd05c2f20ca7576ed3d23bfdad

    • \Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll

      MD5

      1d52252cdbee03a732bc4951fc5639e9

      SHA1

      8c52016953aef6e2ee56013218c40dfe008c0f98

      SHA256

      372da9447db4ca966a6a9fd45f12519637a562953a88b6d92fb26d3699c14799

      SHA512

      abcd7f2529a3ea4e5ac1c4d7864e0974d7cc2df576fbc8c3756e7251a0307ec0f3f9948876786ec31ed9752fb4482f4abf8268dd05c2f20ca7576ed3d23bfdad

    • memory/2120-5-0x0000000000000000-mapping.dmp

    • memory/3132-2-0x0000015663E80000-0x00000156644B7000-memory.dmp

      Filesize

      6.2MB

    • memory/3172-3-0x0000000000000000-mapping.dmp

    • memory/3172-4-0x0000000002500000-0x0000000002501000-memory.dmp

      Filesize

      4KB

    • memory/3836-7-0x0000000000000000-mapping.dmp

    • memory/3960-9-0x0000000004A00000-0x0000000004A01000-memory.dmp

      Filesize

      4KB