Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2022 11:54
Behavioral task
behavioral1
Sample
challenge-files/challenge-files/docs 06.02.2021.docm
Resource
win10v2004-20220721-en
General
-
Target
challenge-files/challenge-files/docs 06.02.2021.docm
-
Size
43KB
-
MD5
f08771b9fdfe82caaa089641e2348c8e
-
SHA1
b02c121597c9d56d7fab76b54834d5f3bd961e8c
-
SHA256
cc721111b5924cfeb91440ecaccc60ecc30d10fffbdab262f7c0a17027f527d1
-
SHA512
3bb2b582e7119c346473f78056f95e0890a3e74976de733739af9aaef810c4e62b35d7f81ec52acfbf675d3d501a048a36fa323ef76ee8843502424211b46ebd
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
explorer.exemsedge.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3476 868 explorer.exe WINWORD.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1196 868 msedge.exe WINWORD.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation mshta.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
WINWORD.EXEmsedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 2 IoCs
Processes:
msedge.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 868 WINWORD.EXE 868 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msedge.exemsedge.exepid process 264 msedge.exe 264 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
msedge.exepid process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
WINWORD.EXEpid process 868 WINWORD.EXE 868 WINWORD.EXE 868 WINWORD.EXE 868 WINWORD.EXE 868 WINWORD.EXE 868 WINWORD.EXE 868 WINWORD.EXE 868 WINWORD.EXE 868 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
WINWORD.EXEexplorer.exemshta.exemsedge.exedescription pid process target process PID 868 wrote to memory of 3476 868 WINWORD.EXE explorer.exe PID 868 wrote to memory of 3476 868 WINWORD.EXE explorer.exe PID 4584 wrote to memory of 1716 4584 explorer.exe mshta.exe PID 4584 wrote to memory of 1716 4584 explorer.exe mshta.exe PID 4584 wrote to memory of 1716 4584 explorer.exe mshta.exe PID 1716 wrote to memory of 1280 1716 mshta.exe rundll32.exe PID 1716 wrote to memory of 1280 1716 mshta.exe rundll32.exe PID 1716 wrote to memory of 1280 1716 mshta.exe rundll32.exe PID 868 wrote to memory of 1196 868 WINWORD.EXE msedge.exe PID 868 wrote to memory of 1196 868 WINWORD.EXE msedge.exe PID 1196 wrote to memory of 1976 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1976 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 640 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 264 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 264 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 3944 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 3944 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 3944 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 3944 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 3944 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 3944 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 3944 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 3944 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 3944 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 3944 1196 msedge.exe msedge.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\challenge-files\challenge-files\docs 06.02.2021.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\explorer.exeexplorer collectionBoxConst.hta2⤵
- Process spawned unexpected child process
PID:3476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go.microsoft.com/fwlink/?LinkId=6149812⤵
- Process spawned unexpected child process
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9316a46f8,0x7ff9316a4708,0x7ff9316a47183⤵PID:1976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,10289282566446078370,2950497905865591664,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:23⤵PID:640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,10289282566446078370,2950497905865591664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,10289282566446078370,2950497905865591664,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:83⤵PID:3944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10289282566446078370,2950497905865591664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:13⤵PID:4380
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10289282566446078370,2950497905865591664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:13⤵PID:3444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2036,10289282566446078370,2950497905865591664,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5240 /prefetch:83⤵PID:4388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10289282566446078370,2950497905865591664,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:13⤵PID:2672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10289282566446078370,2950497905865591664,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:13⤵PID:4600
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\challenge-files\challenge-files\collectionBoxConst.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" c:\users\public\collectionBoxConst.jpg,PluginInit3⤵PID:1280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
Filesize471B
MD5e13e52c01afca5cec00037a35be4a80d
SHA19e8a4dcabbee24b878ecccad85e0a4ffdbeea85c
SHA25692bb55d3fced63e1a5734e5cb4fd2f28040d31377ae1d71129ac697e9b315c16
SHA512b90ee492db97027d0663a07c51a7e453ac3858a37427253444132eb6d8aa266a48c8001519ef529707ed628a391fdb0f44071687230fe59811bba78987f7b5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
Filesize412B
MD5f7d8e7390aac83c158361829bf3f1f0a
SHA1a8e154be03dad2e98ad607f64097aa69fbd92b83
SHA2562fa5a3edc0835254d989df50cc582efe3e48bab5ed94c04d5093a8ab974c1b9d
SHA5128f524d34bc830c2f56d4cfd90ce0232a7a721a100a83d60b39462eef9e1f74fcd30f3c840a0ff775c7a6c87bfe8ad783da059e3385e420a7e313ece1a1c6e886
-
Filesize
3KB
MD599a1a4391c6be3ac5f137c0a092d8edd
SHA134afc663a569d0ba183c73ab40ae8d682273d193
SHA256b25865183c5cd2c5e550aca8476e592b62ed3e37e6b628f955bbed454fdbb100
SHA51245e5b38d72add4d28234b539071a3cb4059c9c104b5389a43190fd3197843e103fdaf7552c1edcb9bbbabe15b122a8bef0389ce39d6130b438a835c4c2d4f345
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e