Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-07-2021 15:27
Static task
static1
Behavioral task
behavioral1
Sample
Customer statement.doc
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Customer statement.doc
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
Customer statement.doc
-
Size
60KB
-
MD5
6a0b254fa9bf238cde9975acbb556da3
-
SHA1
c4778fd61e090ccf7367e8baaa3059292f4c7daa
-
SHA256
bae1e581b513a1a7f1a0f0c8c8f11d2e21b30a10f4a021922cddeec2f62e9cb7
-
SHA512
11ad37c57a8b15c90a3540d487d7084f2fd40090de4d8428f0662e95ad14c7a4e2342155eed7dc045bff153eebbc3ebcb1d00a8c02e6862040cc0c1fe47361a1
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 18 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BasicElegant.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BWClassic.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BWNumbered.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Casual.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$ntered.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$sicSimple.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BasicStylish.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BWCapitalized.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Capitalized.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Classic.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\Word2013BW.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$sicElegant.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BasicSimple.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$sicStylish.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Numbered.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$rd2013BW.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\Casual.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\Centered.dotx WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4648 WINWORD.EXE 4648 WINWORD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WINWORD.EXEpid process 4648 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WINWORD.EXEpid process 4648 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Customer statement.doc" /o ""1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4648