Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
15-12-2021 13:30
Static task
static1
Behavioral task
behavioral1
Sample
deed contract 12.15.2021.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
deed contract 12.15.2021.doc
Resource
win10-en-20211208
General
-
Target
deed contract 12.15.2021.doc
-
Size
42KB
-
MD5
5743e3edb2bf64fe08e5e9a6ea24cd7e
-
SHA1
4bd0151fa9520c9886f7d7a250596687b52bfa81
-
SHA256
f604ca55de802f334064610d65e23890ab81906cdac3f8a5c7c25126176289c8
-
SHA512
8728257bd9a6d3fc252b3fa56ece7b6b81f7ac9608327cf7984600ffb277ac3ba9ebe0bc10bca5b2267a9cf1e9025aea95309efcfb05db6e3f381454ff1296a7
Malware Config
Extracted
icedid
1694525507
firenicatrible.com
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2164 2496 explorer.exe 67 -
Blocklisted process makes network request 1 IoCs
flow pid Process 30 3680 mshta.exe -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 420 regsvr32.exe 596 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2496 WINWORD.EXE 2496 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 596 regsvr32.exe 596 regsvr32.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2164 2496 WINWORD.EXE 70 PID 2496 wrote to memory of 2164 2496 WINWORD.EXE 70 PID 2388 wrote to memory of 3680 2388 explorer.exe 72 PID 2388 wrote to memory of 3680 2388 explorer.exe 72 PID 2388 wrote to memory of 3680 2388 explorer.exe 72 PID 3680 wrote to memory of 420 3680 mshta.exe 75 PID 3680 wrote to memory of 420 3680 mshta.exe 75 PID 3680 wrote to memory of 420 3680 mshta.exe 75 PID 420 wrote to memory of 596 420 regsvr32.exe 76 PID 420 wrote to memory of 596 420 regsvr32.exe 76
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\deed contract 12.15.2021.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
\??\c:\windows\explorer.exec:\windows\explorer karolYouYou.hta2⤵
- Process spawned unexpected child process
PID:2164
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Documents\karolYouYou.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" c:\users\public\youYou.jpg3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\system32\regsvr32.exec:\users\public\youYou.jpg4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:596
-
-
-