Analysis
-
max time kernel
150s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:09
Static task
static1
Behavioral task
behavioral1
Sample
Information_79216117869.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Information_79216117869.doc
Resource
win10v2004-20220414-en
General
-
Target
Information_79216117869.doc
-
Size
548KB
-
MD5
46fb44acc4862a5f3c60b77153676efa
-
SHA1
b4ad77cf731f93a5b3cc59f152be8f39e752b99f
-
SHA256
5505b90064bed94dfd3199e71b06f74aeed136f8a1ced57f65e604ba427016ac
-
SHA512
999724485843a39e0ea7e801fe5ff4ffd4700e139c7a4cde80e59dd2e3b76f84c7d3d4a9863d22f09d6f5f604342ab330b651b58249b0fa4d33f8ce77f43e461
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
notepad.exeWMIC.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4452 1408 notepad.exe WINWORD.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2380 1408 WMIC.exe WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 4452 notepad.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1408 WINWORD.EXE 1408 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 42 IoCs
Processes:
WMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 2380 WMIC.exe Token: SeSecurityPrivilege 2380 WMIC.exe Token: SeTakeOwnershipPrivilege 2380 WMIC.exe Token: SeLoadDriverPrivilege 2380 WMIC.exe Token: SeSystemProfilePrivilege 2380 WMIC.exe Token: SeSystemtimePrivilege 2380 WMIC.exe Token: SeProfSingleProcessPrivilege 2380 WMIC.exe Token: SeIncBasePriorityPrivilege 2380 WMIC.exe Token: SeCreatePagefilePrivilege 2380 WMIC.exe Token: SeBackupPrivilege 2380 WMIC.exe Token: SeRestorePrivilege 2380 WMIC.exe Token: SeShutdownPrivilege 2380 WMIC.exe Token: SeDebugPrivilege 2380 WMIC.exe Token: SeSystemEnvironmentPrivilege 2380 WMIC.exe Token: SeRemoteShutdownPrivilege 2380 WMIC.exe Token: SeUndockPrivilege 2380 WMIC.exe Token: SeManageVolumePrivilege 2380 WMIC.exe Token: 33 2380 WMIC.exe Token: 34 2380 WMIC.exe Token: 35 2380 WMIC.exe Token: 36 2380 WMIC.exe Token: SeIncreaseQuotaPrivilege 2380 WMIC.exe Token: SeSecurityPrivilege 2380 WMIC.exe Token: SeTakeOwnershipPrivilege 2380 WMIC.exe Token: SeLoadDriverPrivilege 2380 WMIC.exe Token: SeSystemProfilePrivilege 2380 WMIC.exe Token: SeSystemtimePrivilege 2380 WMIC.exe Token: SeProfSingleProcessPrivilege 2380 WMIC.exe Token: SeIncBasePriorityPrivilege 2380 WMIC.exe Token: SeCreatePagefilePrivilege 2380 WMIC.exe Token: SeBackupPrivilege 2380 WMIC.exe Token: SeRestorePrivilege 2380 WMIC.exe Token: SeShutdownPrivilege 2380 WMIC.exe Token: SeDebugPrivilege 2380 WMIC.exe Token: SeSystemEnvironmentPrivilege 2380 WMIC.exe Token: SeRemoteShutdownPrivilege 2380 WMIC.exe Token: SeUndockPrivilege 2380 WMIC.exe Token: SeManageVolumePrivilege 2380 WMIC.exe Token: 33 2380 WMIC.exe Token: 34 2380 WMIC.exe Token: 35 2380 WMIC.exe Token: 36 2380 WMIC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 1408 WINWORD.EXE 1408 WINWORD.EXE 1408 WINWORD.EXE 1408 WINWORD.EXE 1408 WINWORD.EXE 1408 WINWORD.EXE 1408 WINWORD.EXE 1408 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 1408 wrote to memory of 4452 1408 WINWORD.EXE notepad.exe PID 1408 wrote to memory of 4452 1408 WINWORD.EXE notepad.exe PID 1408 wrote to memory of 2380 1408 WINWORD.EXE WMIC.exe PID 1408 wrote to memory of 2380 1408 WINWORD.EXE WMIC.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Information_79216117869.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\AppData\Roaming\most_acutely_did.txt2⤵
- Process spawned unexpected child process
- Opens file in notepad (likely ransom note)
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe"2⤵
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\most_acutely_did.txtFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
memory/1408-130-0x00007FFF77E70000-0x00007FFF77E80000-memory.dmpFilesize
64KB
-
memory/1408-131-0x00007FFF77E70000-0x00007FFF77E80000-memory.dmpFilesize
64KB
-
memory/1408-132-0x00007FFF77E70000-0x00007FFF77E80000-memory.dmpFilesize
64KB
-
memory/1408-133-0x00007FFF77E70000-0x00007FFF77E80000-memory.dmpFilesize
64KB
-
memory/1408-134-0x00007FFF77E70000-0x00007FFF77E80000-memory.dmpFilesize
64KB
-
memory/1408-135-0x00007FFF75DE0000-0x00007FFF75DF0000-memory.dmpFilesize
64KB
-
memory/1408-136-0x00007FFF75DE0000-0x00007FFF75DF0000-memory.dmpFilesize
64KB
-
memory/2380-139-0x0000000000000000-mapping.dmp
-
memory/4452-137-0x0000000000000000-mapping.dmp