Analysis
-
max time kernel
141s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
34fb40ba8037a55e6beafa9767b25bf9e96272e9a32ff2b88dc66d529dad2a81.rtf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
34fb40ba8037a55e6beafa9767b25bf9e96272e9a32ff2b88dc66d529dad2a81.rtf
Resource
win10v2004-20221111-en
General
-
Target
34fb40ba8037a55e6beafa9767b25bf9e96272e9a32ff2b88dc66d529dad2a81.rtf
-
Size
76KB
-
MD5
2b4b0ba685522de8398d14d540b41a3a
-
SHA1
a1775333979c220ffadfb0fbc30f1b11ae8e500f
-
SHA256
34fb40ba8037a55e6beafa9767b25bf9e96272e9a32ff2b88dc66d529dad2a81
-
SHA512
f90dbe910080cb1adeebc6322d3955cf8194455140bb2c8bd5f2376b07334290cbc52de5e4ce0b70d4e290e3c712b19b7acffdcda3e8690424a382527889a9ef
-
SSDEEP
768:Cww+/yQPu+nS+YMyvsOdRdrpDVHftZGPkVUGwX31+1vZnKuYHx+CTgNEwsN9TX8B:+uu+nS+OLpDVHPYgUJHEc/xgdUTo19X
Malware Config
Signatures
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1424 1552 DW20.EXE 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1552 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1552 WINWORD.EXE 1552 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1552 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1552 WINWORD.EXE 1552 WINWORD.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1552 wrote to memory of 544 1552 WINWORD.EXE 28 PID 1552 wrote to memory of 544 1552 WINWORD.EXE 28 PID 1552 wrote to memory of 544 1552 WINWORD.EXE 28 PID 1552 wrote to memory of 544 1552 WINWORD.EXE 28 PID 1552 wrote to memory of 1424 1552 WINWORD.EXE 31 PID 1552 wrote to memory of 1424 1552 WINWORD.EXE 31 PID 1552 wrote to memory of 1424 1552 WINWORD.EXE 31 PID 1552 wrote to memory of 1424 1552 WINWORD.EXE 31 PID 1552 wrote to memory of 1424 1552 WINWORD.EXE 31 PID 1552 wrote to memory of 1424 1552 WINWORD.EXE 31 PID 1552 wrote to memory of 1424 1552 WINWORD.EXE 31 PID 1424 wrote to memory of 1812 1424 DW20.EXE 32 PID 1424 wrote to memory of 1812 1424 DW20.EXE 32 PID 1424 wrote to memory of 1812 1424 DW20.EXE 32 PID 1424 wrote to memory of 1812 1424 DW20.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\34fb40ba8037a55e6beafa9767b25bf9e96272e9a32ff2b88dc66d529dad2a81.rtf"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:544
-
-
C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE"C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 11842⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 11843⤵PID:1812
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
812B
MD57b4f44c1648059ba62847a80886ad3b1
SHA14a35c9133f455955ea21a6ec73379067df8fec5c
SHA2569eeff5fc30e7882155cf73b08f96dbe111aae2db2ed6ac8c721c942c6a0e44ac
SHA5121fc9d37dd433c647df33fde53074a747d91be8809af5ab075c59f3e3fa103ea08e06849c092dc0ba7d10e7da8d401c8aa337aab07bd33e4b7107ee61124700c5