Analysis

  • max time kernel
    142s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2022 16:57

General

  • Target

    482ca49dcab02d9db9267547fa3de8a5c022ce2daf57b796b818b688f8271e76.doc

  • Size

    251KB

  • MD5

    a17482cf4121bef6ddde8b40d1bcecf0

  • SHA1

    e80199df5a0863d01819de0c2bc3fe3eb1e13338

  • SHA256

    482ca49dcab02d9db9267547fa3de8a5c022ce2daf57b796b818b688f8271e76

  • SHA512

    8a982f16762362262992524e8715bb9820843681bdf3096fae088532764f1ef1a52cf7292bcaea3577a8f3d88899efd18b791d4baeb65de3ef09df4a9fc6ac8d

  • SSDEEP

    3072:vjPvvZYOdkm9spw7uzeJq+oqZSqf8/ISU5uW:zprkm9awDJhoeSRJD

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\482ca49dcab02d9db9267547fa3de8a5c022ce2daf57b796b818b688f8271e76.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\13539.bat
      2⤵
      • Process spawned unexpected child process
      PID:3852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\13539.bat

    Filesize

    2B

    MD5

    81051bcc2cf1bedf378224b0a93e2877

    SHA1

    ba8ab5a0280b953aa97435ff8946cbcbb2755a27

    SHA256

    7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

    SHA512

    1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

  • memory/4452-135-0x00007FFFBCD90000-0x00007FFFBCDA0000-memory.dmp

    Filesize

    64KB

  • memory/4452-132-0x00007FFFBCD90000-0x00007FFFBCDA0000-memory.dmp

    Filesize

    64KB

  • memory/4452-136-0x00007FFFBCD90000-0x00007FFFBCDA0000-memory.dmp

    Filesize

    64KB

  • memory/4452-137-0x00007FFFBAAF0000-0x00007FFFBAB00000-memory.dmp

    Filesize

    64KB

  • memory/4452-138-0x00007FFFBAAF0000-0x00007FFFBAB00000-memory.dmp

    Filesize

    64KB

  • memory/4452-139-0x00000171C6307000-0x00000171C6309000-memory.dmp

    Filesize

    8KB

  • memory/4452-140-0x00000171C6307000-0x00000171C6309000-memory.dmp

    Filesize

    8KB

  • memory/4452-134-0x00007FFFBCD90000-0x00007FFFBCDA0000-memory.dmp

    Filesize

    64KB

  • memory/4452-133-0x00007FFFBCD90000-0x00007FFFBCDA0000-memory.dmp

    Filesize

    64KB

  • memory/4452-144-0x00007FFFBCD90000-0x00007FFFBCDA0000-memory.dmp

    Filesize

    64KB

  • memory/4452-145-0x00007FFFBCD90000-0x00007FFFBCDA0000-memory.dmp

    Filesize

    64KB

  • memory/4452-146-0x00007FFFBCD90000-0x00007FFFBCDA0000-memory.dmp

    Filesize

    64KB

  • memory/4452-147-0x00007FFFBCD90000-0x00007FFFBCDA0000-memory.dmp

    Filesize

    64KB