Analysis
-
max time kernel
131s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
18-03-2022 10:24
Static task
static1
Behavioral task
behavioral1
Sample
5d7c07035e5257a64d546e69112d17d2eab977cca23e225cfcfc8ac59334aa78.dotm
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
5d7c07035e5257a64d546e69112d17d2eab977cca23e225cfcfc8ac59334aa78.dotm
Resource
win10v2004-en-20220113
General
-
Target
5d7c07035e5257a64d546e69112d17d2eab977cca23e225cfcfc8ac59334aa78.dotm
-
Size
21KB
-
MD5
da9816b60d9866b1b6d90a8e20e39623
-
SHA1
685b49e2e1855f4a8b455a5969e4df02f5c75356
-
SHA256
5d7c07035e5257a64d546e69112d17d2eab977cca23e225cfcfc8ac59334aa78
-
SHA512
8a3b8170eae3eb81017696f3fb3485981752cf0520a9d9ff141db08a6b2b262defd440a407e91afd3599fdaca849cba487fe8209b6f001db0cf8469a5e431288
Malware Config
Signatures
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
Processes:
DW20.EXEdescription pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4600 1852 DW20.EXE 78 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dwwin.exedescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dwwin.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dwwin.exedescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwwin.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid Process 1852 WINWORD.EXE 1852 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WINWORD.EXEpid Process 1852 WINWORD.EXE 1852 WINWORD.EXE 1852 WINWORD.EXE 1852 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
WINWORD.EXEpid Process 1852 WINWORD.EXE 1852 WINWORD.EXE 1852 WINWORD.EXE 1852 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WINWORD.EXEDW20.EXEdescription pid Process procid_target PID 1852 wrote to memory of 4600 1852 WINWORD.EXE 80 PID 1852 wrote to memory of 4600 1852 WINWORD.EXE 80 PID 4600 wrote to memory of 4644 4600 DW20.EXE 81 PID 4600 wrote to memory of 4644 4600 DW20.EXE 81
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5d7c07035e5257a64d546e69112d17d2eab977cca23e225cfcfc8ac59334aa78.dotm" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 37882⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 37883⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4644
-
-