Analysis
-
max time kernel
0s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:03
Static task
static1
Behavioral task
behavioral1
Sample
6d0458827121c7a2e95676419e88b0ed.doc
Resource
win7-20231129-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
6d0458827121c7a2e95676419e88b0ed.doc
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
6d0458827121c7a2e95676419e88b0ed.doc
-
Size
71KB
-
MD5
6d0458827121c7a2e95676419e88b0ed
-
SHA1
226566429e1883faa2e87f1a626c4e12e303e605
-
SHA256
1faab34dd2c0d326595be53a4c0092c9f7f10fbd8054a54e4d1b0beaf5ab5518
-
SHA512
7cc042a3a6f59ed20a30ae8b6cd9d7db1b4c6b221daceef6aa41ce1f1514673477e043103be9a5428a208672f8111370272943ee087674441743a64f31186b63
-
SSDEEP
1536:EYBwk0vEHr11AQYyqGJHQYCDEtU6dLTR97el:dwnv+xQYNtU6Zvel
Score
10/10
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1172 5044 cmd.exe 14 -
Program crash 1 IoCs
pid pid_target Process procid_target 4132 2000 WerFault.exe 23
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6d0458827121c7a2e95676419e88b0ed.doc" /o ""1⤵PID:5044
-
C:\Windows\SYSTEM32\cmd.execmd /c c:\programdata\compareCompare.hta2⤵
- Process spawned unexpected child process
PID:1172 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\programdata\compareCompare.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 13564⤵
- Program crash
PID:4132
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2000 -ip 20001⤵PID:2820