Analysis

  • max time kernel
    169s
  • max time network
    228s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 05:03

General

  • Target

    315644e7ccc27084de88d6108f59edde58a8775584bdf2e5fbb22841cc353e5d.docm

  • Size

    487KB

  • MD5

    05cb50f35c90a9373786deaf55bf72c8

  • SHA1

    e5604680b11e788d04b906d3e2560fa44e498b2c

  • SHA256

    315644e7ccc27084de88d6108f59edde58a8775584bdf2e5fbb22841cc353e5d

  • SHA512

    864e6955ff303560e120d0fde43898809e2542e1c19aa2cbd12168c6804bb660f67270ee33919f651b4b8bc2526e785d193d5ffbdc0f90b8fa0e6ee1beb9d64c

Score
10/10

Malware Config

Signatures

  • Ostap JavaScript Downloader 1 IoCs

    Ostap is a JavaScript downloader that's been active since 2016. It's used to deliver several families, inluding TrickBot

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ostap

    Ostap is a JS downloader, used to deliver other families.

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\315644e7ccc27084de88d6108f59edde58a8775584bdf2e5fbb22841cc353e5d.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\LibWinTasksProvider\WedpolicyDepSet\CalenderView.BAT
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\system32\wscript.exe
        wscript C:\LibWinTasksProvider\CalenderView.JSE /nologo
        3⤵
          PID:3456
      • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
        "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 4952
        2⤵
        • Process spawned suspicious child process
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Windows\system32\dwwin.exe
          C:\Windows\system32\dwwin.exe -x -s 4952
          3⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          PID:3696

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\LibWinTasksProvider\CalenderView.JSE

      Filesize

      336KB

      MD5

      3573a33988c2c19f18d2de07b87818fc

      SHA1

      7b44b46e34c1b0cb76522b763d3035f6c7d39a12

      SHA256

      3e76e0aaac22c57a6928fa2b5864098ceb56b836e0b20f568cc476b99f82568a

      SHA512

      5b224b631a7e3d26bef8c4e55dc4fa8e0971431d31290fb72b3565d281987d5eed31e3cf63e5a56c50c989ce5f14c20fea1f686fc16cceefb97ba88863253875

    • C:\LibWinTasksProvider\WedpolicyDepSet\CalenderView.BAT

      Filesize

      57B

      MD5

      61e8655ca1393b13c826953a9bbf13d3

      SHA1

      8c374c3db43c183cb7b1afb9780f34facfe3a6b8

      SHA256

      7414e595c91d12ba7f4aabe2842b7743d5dee264016dfb82bf5314f17f29eddf

      SHA512

      f9688ff4464a263f613d5c979d2c3f4f513f2cdf9f89390b5b2e1487373de308a810e75cd65888eabde96ede71ee0da74e6c10f2a374dae83e98cb116f055d6d

    • memory/1284-135-0x00007FFBA5150000-0x00007FFBA5160000-memory.dmp

      Filesize

      64KB

    • memory/1284-131-0x00007FFBA71B0000-0x00007FFBA71C0000-memory.dmp

      Filesize

      64KB

    • memory/1284-134-0x00007FFBA71B0000-0x00007FFBA71C0000-memory.dmp

      Filesize

      64KB

    • memory/1284-130-0x00007FFBA71B0000-0x00007FFBA71C0000-memory.dmp

      Filesize

      64KB

    • memory/1284-136-0x00007FFBA5150000-0x00007FFBA5160000-memory.dmp

      Filesize

      64KB

    • memory/1284-137-0x0000020BFB140000-0x0000020BFB144000-memory.dmp

      Filesize

      16KB

    • memory/1284-138-0x0000020BF9E4A000-0x0000020BF9E4C000-memory.dmp

      Filesize

      8KB

    • memory/1284-143-0x0000020BFA0A5000-0x0000020BFA0A7000-memory.dmp

      Filesize

      8KB

    • memory/1284-132-0x00007FFBA71B0000-0x00007FFBA71C0000-memory.dmp

      Filesize

      64KB

    • memory/1284-133-0x00007FFBA71B0000-0x00007FFBA71C0000-memory.dmp

      Filesize

      64KB

    • memory/1660-139-0x0000000000000000-mapping.dmp

    • memory/1728-154-0x00007FFBA71B0000-0x00007FFBA71C0000-memory.dmp

      Filesize

      64KB

    • memory/1728-144-0x0000000000000000-mapping.dmp

    • memory/1728-153-0x00007FFBA71B0000-0x00007FFBA71C0000-memory.dmp

      Filesize

      64KB

    • memory/1728-151-0x00007FFBA71B0000-0x00007FFBA71C0000-memory.dmp

      Filesize

      64KB

    • memory/1728-152-0x00007FFBA71B0000-0x00007FFBA71C0000-memory.dmp

      Filesize

      64KB

    • memory/3456-141-0x0000000000000000-mapping.dmp

    • memory/3696-150-0x0000000000000000-mapping.dmp