Analysis

  • max time kernel
    155s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 06:26

General

  • Target

    110986032178b10db54de8e6f047a557.doc

  • Size

    58KB

  • MD5

    110986032178b10db54de8e6f047a557

  • SHA1

    6be7466dd6bc76ec06c7e94a868e48b62319cead

  • SHA256

    2fdbc088effaefebd85995c54b7af5f7f17fc809a48bc99f048b97fb0c8f2e20

  • SHA512

    b0dbc3562ebd31e85b2611358886d6caa50c0b93aa261f8e90c6235c2b62697d78e28a7f818e3473b4cde809d8b1fd0f7694bfbc355f5dd91ded86119184e912

  • SSDEEP

    768:yYY1e1/v9b8P1gdJMw7A1xP8HtzWktfjgMRKDUeo1RD+yK806qBlUsl9d+:yYY0NVbpAPP8HtzWk10MkDUeAR0PnvrY

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\110986032178b10db54de8e6f047a557.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c c:\programdata\compsBrCode.hta
      2⤵
      • Process spawned unexpected child process
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\programdata\compsBrCode.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        3⤵
          PID:1516
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 1356
            4⤵
            • Program crash
            PID:1120
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1516 -ip 1516
      1⤵
        PID:4716

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\programdata\compsBrCode.hta

        Filesize

        3KB

        MD5

        2c53aa219cf6af1b52fbf0f43dc8776e

        SHA1

        1fdb2cae6c7d4ff6ed975f9b4e49a1e93a5d071c

        SHA256

        a145b75dfa7160e375ff1b3f9ac62e93227fdec550f6f54c6beeb753f6973c79

        SHA512

        946e50c45a24f2d0d4338a2b46bd82ee770c5da7bffbe3542e4a4dce22f7a6d4170067b8169d72c008d829c171e4fa2a128c5e0cf50b71e90bc3c532dc25e43f

      • memory/4364-1-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-0-0x00007FFF6CCB0000-0x00007FFF6CCC0000-memory.dmp

        Filesize

        64KB

      • memory/4364-2-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-3-0x00007FFF6CCB0000-0x00007FFF6CCC0000-memory.dmp

        Filesize

        64KB

      • memory/4364-5-0x00007FFF6CCB0000-0x00007FFF6CCC0000-memory.dmp

        Filesize

        64KB

      • memory/4364-4-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-6-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-7-0x00007FFF6CCB0000-0x00007FFF6CCC0000-memory.dmp

        Filesize

        64KB

      • memory/4364-8-0x00007FFF6CCB0000-0x00007FFF6CCC0000-memory.dmp

        Filesize

        64KB

      • memory/4364-9-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-10-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-11-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-12-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-13-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-15-0x00007FFF6AB40000-0x00007FFF6AB50000-memory.dmp

        Filesize

        64KB

      • memory/4364-16-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-14-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-18-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-17-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-19-0x00007FFF6AB40000-0x00007FFF6AB50000-memory.dmp

        Filesize

        64KB

      • memory/4364-35-0x00000216346A0000-0x0000021634EA0000-memory.dmp

        Filesize

        8.0MB

      • memory/4364-39-0x00000216346A0000-0x0000021634EA0000-memory.dmp

        Filesize

        8.0MB

      • memory/4364-41-0x00000216346A0000-0x0000021634EA0000-memory.dmp

        Filesize

        8.0MB

      • memory/4364-42-0x00000216346A0000-0x0000021634EA0000-memory.dmp

        Filesize

        8.0MB

      • memory/4364-51-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-54-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-55-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-56-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-57-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-58-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-59-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-60-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-61-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-62-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-63-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-65-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-64-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-66-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-67-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-68-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-70-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-71-0x00000216346A0000-0x0000021634EA0000-memory.dmp

        Filesize

        8.0MB

      • memory/4364-72-0x00000216346A0000-0x0000021634EA0000-memory.dmp

        Filesize

        8.0MB

      • memory/4364-73-0x00000216346A0000-0x0000021634EA0000-memory.dmp

        Filesize

        8.0MB

      • memory/4364-74-0x00000216346A0000-0x0000021634EA0000-memory.dmp

        Filesize

        8.0MB

      • memory/4364-95-0x00007FFF6CCB0000-0x00007FFF6CCC0000-memory.dmp

        Filesize

        64KB

      • memory/4364-96-0x00007FFF6CCB0000-0x00007FFF6CCC0000-memory.dmp

        Filesize

        64KB

      • memory/4364-97-0x00007FFF6CCB0000-0x00007FFF6CCC0000-memory.dmp

        Filesize

        64KB

      • memory/4364-98-0x00007FFF6CCB0000-0x00007FFF6CCC0000-memory.dmp

        Filesize

        64KB

      • memory/4364-99-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB

      • memory/4364-100-0x00007FFFACC30000-0x00007FFFACE25000-memory.dmp

        Filesize

        2.0MB