Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12-01-2021 20:14

General

  • Target

    0112_679538951.doc

  • Size

    372KB

  • MD5

    e3163d9a0638eb38b57d60a261c90fba

  • SHA1

    7f717a2af835a52fa56d30d38f0379a3edacc7bd

  • SHA256

    22043734ed3f774db7a88297286f6ecd56336d755cc19f1bd54f2a2ac58982cd

  • SHA512

    a39b7ac2be33645357ca2d4bb28915788b186ac44e9dd82938d481f8e6f5e17883bd034137ef9c5e2956ae1eb88d677b37d7c6c83efb8330bcff9ba4655258d6

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0112_679538951.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:500
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4092
      • C:\Windows\System32\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll,DllUnregisterServer
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:4088
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll,DllUnregisterServer
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:1876
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 1344
            4⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2084

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll

      MD5

      10727db5fabb9df4ff0b301b9cbe5b71

      SHA1

      9e70e123826b629ae4fe4202e34925e2b3b8c948

      SHA256

      edabef17fce2aaca61dbd17a57baf780cd82a2b0189b0cf3c5a7a3ca07e94a44

      SHA512

      1f9e06641f4b543b056975dfc1f3064d0d54b03a9d21fb28ce3582236228fc996fc94e532b27f5c9ebf88d624392e97c4a04d0bc2de649ca0ff9281a38fe21d6

    • \Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll

      MD5

      10727db5fabb9df4ff0b301b9cbe5b71

      SHA1

      9e70e123826b629ae4fe4202e34925e2b3b8c948

      SHA256

      edabef17fce2aaca61dbd17a57baf780cd82a2b0189b0cf3c5a7a3ca07e94a44

      SHA512

      1f9e06641f4b543b056975dfc1f3064d0d54b03a9d21fb28ce3582236228fc996fc94e532b27f5c9ebf88d624392e97c4a04d0bc2de649ca0ff9281a38fe21d6

    • memory/500-2-0x000001B1F62A0000-0x000001B1F68D7000-memory.dmp

      Filesize

      6.2MB

    • memory/1876-7-0x0000000000000000-mapping.dmp

    • memory/2084-9-0x0000000004480000-0x0000000004481000-memory.dmp

      Filesize

      4KB

    • memory/4088-5-0x0000000000000000-mapping.dmp

    • memory/4092-3-0x0000000000000000-mapping.dmp

    • memory/4092-4-0x0000000002450000-0x0000000002451000-memory.dmp

      Filesize

      4KB