Analysis

  • max time kernel
    300s
  • max time network
    309s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    21-07-2021 20:45

General

  • Target

    sample.doc

  • Size

    97KB

  • MD5

    356a5c57245204778e4987ca33558603

  • SHA1

    295160cddc9a18dc0809c547908e19e4272e01f3

  • SHA256

    105d9496d4f80ae5ef3c7642f55117b65a10398afe5ff9c30d706fa9873cfd6a

  • SHA512

    27b256f8c7c8eeed8b0bca491e92c75541b53c594e5f1e6f63d923eda9748939ae7aedac3e2be592801a36c6ff56fabb6cdd847116f97fff76422092a15d8670

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\sample.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\rtbdxsdcb.js
      2⤵
      • Process spawned unexpected child process
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\rtbdxsdcb.js"
        3⤵
        • Blocklisted process makes network request
        PID:4568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rtbdxsdcb.js

    MD5

    e9f682952083ebba2e284c940777d659

    SHA1

    149b2c7ebc25d57132df7839ec2ae113c9fe8a01

    SHA256

    32437763a96d909d6103e0d374050c94f2f30fb7ce122ebb8dd7819146966438

    SHA512

    bbf170625271706a3789822073fe4cc79f4e7cd49b03ae840bb5acaec4a90c84492a0ad808aeb1d030eabd69b7f5a47411add3cc3db281a451bbfdb003a163c2

  • memory/1908-255-0x0000000000000000-mapping.dmp

  • memory/4568-258-0x0000000000000000-mapping.dmp

  • memory/4796-114-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmp

    Filesize

    64KB

  • memory/4796-115-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmp

    Filesize

    64KB

  • memory/4796-116-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmp

    Filesize

    64KB

  • memory/4796-117-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmp

    Filesize

    64KB

  • memory/4796-119-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmp

    Filesize

    64KB

  • memory/4796-118-0x00007FFD8FC40000-0x00007FFD92763000-memory.dmp

    Filesize

    43.1MB

  • memory/4796-122-0x00007FFD8A4A0000-0x00007FFD8B58E000-memory.dmp

    Filesize

    16.9MB

  • memory/4796-123-0x00007FFD885A0000-0x00007FFD8A495000-memory.dmp

    Filesize

    31.0MB