Analysis
-
max time kernel
137s -
max time network
132s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 08:09
Static task
static1
Behavioral task
behavioral1
Sample
mal.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
mal.doc
Resource
win10v20201028
General
-
Target
mal.doc
-
Size
63KB
-
MD5
7b5f1c01980faf7801f16a761cb8d377
-
SHA1
ee47206c87482de1915b1e441a23a5b3473697e3
-
SHA256
3c59ad7c4426e8396369f084c35a2bd3f0caa3ba1d1a91794153507210a77c90
-
SHA512
26172fb0bbe1b3fc46fedd7a50eeba589134bb9feeb503271c52eec9ec973131b0cfd0a343232dd9f72552fe48dcd70244be416f80237cf9e5773766355e412a
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
notepad.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2548 640 notepad.exe WINWORD.EXE -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
notepad.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion notepad.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Windows\16027.dat notepad.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 640 WINWORD.EXE 640 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
notepad.exepid process 2548 notepad.exe 2548 notepad.exe 2548 notepad.exe 2548 notepad.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
WINWORD.EXEpid process 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 640 wrote to memory of 2548 640 WINWORD.EXE notepad.exe PID 640 wrote to memory of 2548 640 WINWORD.EXE notepad.exe PID 640 wrote to memory of 2548 640 WINWORD.EXE notepad.exe PID 640 wrote to memory of 2548 640 WINWORD.EXE notepad.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\mal.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe2⤵
- Process spawned unexpected child process
- Checks BIOS information in registry
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2548