Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 16:24
Static task
static1
Behavioral task
behavioral1
Sample
0113_88514789.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0113_88514789.doc
Resource
win10v20201028
General
-
Target
0113_88514789.doc
-
Size
633KB
-
MD5
e920a98ccda2ecf95cca8e6d4e66e0ac
-
SHA1
e39ee8709a55f915446d4d22d581aa03422b6378
-
SHA256
40c3eb22a02601cf70a4ae08eeaa5805144386bc13882e5f110c133b1d0ede8e
-
SHA512
55948ee47c7e22fafef4b387047312699c926f7fae0cb8d08fdc0c761abd146ba52a712873d13ef980309e981102e07608f65a10236765a5791bb4fc26387965
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2176 3372 rundll32.exe WINWORD.EXE -
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 33 1140 rundll32.exe 35 1140 rundll32.exe 37 1140 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1140 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 32 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\{C3ED3F23-F896-4BA3-8A76-A5526BC57378}\0fiasS.tmp:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3372 WINWORD.EXE 3372 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1140 rundll32.exe 1140 rundll32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
WINWORD.EXErundll32.exerundll32.exedescription pid process target process PID 3372 wrote to memory of 3020 3372 WINWORD.EXE splwow64.exe PID 3372 wrote to memory of 3020 3372 WINWORD.EXE splwow64.exe PID 3372 wrote to memory of 2176 3372 WINWORD.EXE rundll32.exe PID 3372 wrote to memory of 2176 3372 WINWORD.EXE rundll32.exe PID 2176 wrote to memory of 1140 2176 rundll32.exe rundll32.exe PID 2176 wrote to memory of 1140 2176 rundll32.exe rundll32.exe PID 2176 wrote to memory of 1140 2176 rundll32.exe rundll32.exe PID 1140 wrote to memory of 3820 1140 rundll32.exe svchost.exe PID 1140 wrote to memory of 3820 1140 rundll32.exe svchost.exe PID 1140 wrote to memory of 3820 1140 rundll32.exe svchost.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0113_88514789.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3020
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll,DllUnregisterServer2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll,DllUnregisterServer3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe4⤵PID:3820
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8a8ab0861760e3ac3659fd2b35a4c1ce
SHA1378a2da03377cc36f5bbded8a8af31f610d2b843
SHA2566caccc64a9db7cfce75076ad273d85d108f5b764fcbbb865fd27c91f86cccfad
SHA512ac3b0a0ccd6081d2fae578631e484e6178e55f996056f4537d3c9000aa234cd969f8536901579d002d9a15151435b43b3e2a89dbc3261d1b55990da21ad0defc
-
MD5
8a8ab0861760e3ac3659fd2b35a4c1ce
SHA1378a2da03377cc36f5bbded8a8af31f610d2b843
SHA2566caccc64a9db7cfce75076ad273d85d108f5b764fcbbb865fd27c91f86cccfad
SHA512ac3b0a0ccd6081d2fae578631e484e6178e55f996056f4537d3c9000aa234cd969f8536901579d002d9a15151435b43b3e2a89dbc3261d1b55990da21ad0defc