Analysis

  • max time kernel
    154s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    15-05-2022 21:33

General

  • Target

    036758a7559851fa28c9d93224ffde645a46b735c7c582e055c5f3316f43fea6.dotm

  • Size

    34KB

  • MD5

    4d12df4ec5f2f0ce59d5d9ffd12feda7

  • SHA1

    c6da737b88b43b4f3d67ddbb5db2cfb9fb79c49e

  • SHA256

    036758a7559851fa28c9d93224ffde645a46b735c7c582e055c5f3316f43fea6

  • SHA512

    29f6c6e0963f76c831b31d22bbe761a066b3ebf927dc34d97edf153782c2e29c4e49242bb394499b10073c5dfa275977afc4f576b2b046b602244ba042e5abe8

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\036758a7559851fa28c9d93224ffde645a46b735c7c582e055c5f3316f43fea6.dotm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 1820
        3⤵
        • Program crash
        PID:2880
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 1820
        3⤵
        • Program crash
        PID:4292
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Process spawned unexpected child process
      PID:3800
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1416 -ip 1416
    1⤵
      PID:4724

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1416-137-0x0000000003200000-0x0000000003600000-memory.dmp

      Filesize

      4.0MB

    • memory/2880-138-0x0000000000000000-mapping.dmp

    • memory/4172-136-0x00007FFA97440000-0x00007FFA97450000-memory.dmp

      Filesize

      64KB

    • memory/4172-133-0x00007FFA994D0000-0x00007FFA994E0000-memory.dmp

      Filesize

      64KB

    • memory/4172-134-0x00007FFA994D0000-0x00007FFA994E0000-memory.dmp

      Filesize

      64KB

    • memory/4172-135-0x00007FFA97440000-0x00007FFA97450000-memory.dmp

      Filesize

      64KB

    • memory/4172-130-0x00007FFA994D0000-0x00007FFA994E0000-memory.dmp

      Filesize

      64KB

    • memory/4172-132-0x00007FFA994D0000-0x00007FFA994E0000-memory.dmp

      Filesize

      64KB

    • memory/4172-131-0x00007FFA994D0000-0x00007FFA994E0000-memory.dmp

      Filesize

      64KB

    • memory/4172-140-0x00007FFA994D0000-0x00007FFA994E0000-memory.dmp

      Filesize

      64KB

    • memory/4172-141-0x00007FFA994D0000-0x00007FFA994E0000-memory.dmp

      Filesize

      64KB

    • memory/4172-142-0x00007FFA994D0000-0x00007FFA994E0000-memory.dmp

      Filesize

      64KB

    • memory/4172-143-0x00007FFA994D0000-0x00007FFA994E0000-memory.dmp

      Filesize

      64KB