Analysis

  • max time kernel
    142s
  • max time network
    138s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    06-07-2021 06:32

General

  • Target

    Inquiry.doc

  • Size

    368KB

  • MD5

    bbf819de6c9330f25be537996b5fc2d3

  • SHA1

    593968326a3b1d3ccd209c9983ede8d800e2cac4

  • SHA256

    f50e0cb0a3ea1ee41d812809b39b71470544dd0d366e8171d5a507e414d6a7df

  • SHA512

    f0acaa1bfbce631596854394caf1b27caa95e4508ff52d53ef5efaa65bbe7975f49bd24412fd50dbfe890e70dbc3d79563c454900f2df1d10702b0b252880e94

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Inquiry.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\PNG32.FLT
      2⤵
      • Process spawned unexpected child process
      PID:2356
  • C:\Windows\system32\werfault.exe
    werfault.exe /h /shared Global\97af0d10cb25483cb01e296ec25e2880 /t 3264 /p 1704
    1⤵
      PID:2108
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2768
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:440
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4220
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4296

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\oice_16_974fa576_32c1d314_273a\AC\Temp\FL46B3.tmp
      MD5

      917b3198acd196cf9cc678b0314ca688

      SHA1

      0cb532be3973cfa5f3c476474100ddb31b4d5321

      SHA256

      b1be75ea13a38663dfbd11c5e25baa734683cdbdb0f96dcfe0a94cc610ded28d

      SHA512

      d05887ffaa163be2f01c70ca161ef1ecadcfae67ff6388251e7851766ab943887b71a0c39ea5630cb0bb2529f370a31e6f2b6b2a978de26beae070715d5df40a

    • memory/1704-114-0x00007FFAC36F0000-0x00007FFAC3700000-memory.dmp
      Filesize

      64KB

    • memory/1704-115-0x00007FFAC36F0000-0x00007FFAC3700000-memory.dmp
      Filesize

      64KB

    • memory/1704-116-0x00007FFAC36F0000-0x00007FFAC3700000-memory.dmp
      Filesize

      64KB

    • memory/1704-117-0x00007FFAC36F0000-0x00007FFAC3700000-memory.dmp
      Filesize

      64KB

    • memory/1704-119-0x00007FFAC36F0000-0x00007FFAC3700000-memory.dmp
      Filesize

      64KB

    • memory/1704-118-0x00007FFAE56C0000-0x00007FFAE81E3000-memory.dmp
      Filesize

      43.1MB

    • memory/1704-122-0x00007FFADDBB0000-0x00007FFADEC9E000-memory.dmp
      Filesize

      16.9MB

    • memory/1704-123-0x00007FFADBCB0000-0x00007FFADDBA5000-memory.dmp
      Filesize

      31.0MB

    • memory/2356-179-0x0000000000000000-mapping.dmp
    • memory/2356-181-0x00007FFAC36F0000-0x00007FFAC3700000-memory.dmp
      Filesize

      64KB