Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 10:49
Behavioral task
behavioral1
Sample
75ea6e8dfaf56fb35f35cb043bd77aef9e2c7d46f3e2a0454dff0952a09c134f.doc
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
75ea6e8dfaf56fb35f35cb043bd77aef9e2c7d46f3e2a0454dff0952a09c134f.doc
Resource
win10v2004-20230915-en
General
-
Target
75ea6e8dfaf56fb35f35cb043bd77aef9e2c7d46f3e2a0454dff0952a09c134f.doc
-
Size
97KB
-
MD5
d57b026809125ec561f6be1889f2f2df
-
SHA1
ec7bc272a6c465db803f257789cfc651890b4d41
-
SHA256
75ea6e8dfaf56fb35f35cb043bd77aef9e2c7d46f3e2a0454dff0952a09c134f
-
SHA512
ebed3a4a58d5a3747b7a328cb9b9960f63c4aaec608503c6343ee96a0bd3bc67178b8d69783da025c8e7592e592c0e4dc079576a4d4073b927fc153f81552687
-
SSDEEP
1536:fzhtOS1YX5tNlHh56NhnP5xG6iHeV82uP:fzhtOSq0d5TMeVMP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule behavioral2/files/0x0006000000023240-57.dat office_macro_on_action -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinCred = "rundll32 \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Office\\WinCred.acl\",WinCred" WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\d.doc\:Zone.Identifier:$DATA WINWORD.EXE File created C:\Users\Admin\AppData\Local\Temp\~WRD0000.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2716 WINWORD.EXE 2716 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE 2716 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\75ea6e8dfaf56fb35f35cb043bd77aef9e2c7d46f3e2a0454dff0952a09c134f.doc" /o ""1⤵
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5be1d0bd61667f87f98293c2c84fbc86c
SHA100262e648981b81b140d83d968a3efb08b3f0574
SHA256409c2034f4d4e8262f19f2174794aeb87729148be53a3d34605f1f7e60aaabc8
SHA512a447ed7d39640c4ed7126143c3ea5b843aff9e610e6b6886230d130eb31510203f32646ddadee5e474fca3184c34472bb5203c89073d9b5196707ca19068eca3