Analysis
-
max time kernel
155s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 06:26
Static task
static1
Behavioral task
behavioral1
Sample
110986032178b10db54de8e6f047a557.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
110986032178b10db54de8e6f047a557.doc
Resource
win10v2004-20231215-en
General
-
Target
110986032178b10db54de8e6f047a557.doc
-
Size
58KB
-
MD5
110986032178b10db54de8e6f047a557
-
SHA1
6be7466dd6bc76ec06c7e94a868e48b62319cead
-
SHA256
2fdbc088effaefebd85995c54b7af5f7f17fc809a48bc99f048b97fb0c8f2e20
-
SHA512
b0dbc3562ebd31e85b2611358886d6caa50c0b93aa261f8e90c6235c2b62697d78e28a7f818e3473b4cde809d8b1fd0f7694bfbc355f5dd91ded86119184e912
-
SSDEEP
768:yYY1e1/v9b8P1gdJMw7A1xP8HtzWktfjgMRKDUeo1RD+yK806qBlUsl9d+:yYY0NVbpAPP8HtzWk10MkDUeAR0PnvrY
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 536 4364 cmd.exe 60 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1120 1516 WerFault.exe 96 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4364 WINWORD.EXE 4364 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4364 WINWORD.EXE 4364 WINWORD.EXE 4364 WINWORD.EXE 4364 WINWORD.EXE 4364 WINWORD.EXE 4364 WINWORD.EXE 4364 WINWORD.EXE 4364 WINWORD.EXE 4364 WINWORD.EXE 4364 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4364 wrote to memory of 536 4364 WINWORD.EXE 94 PID 4364 wrote to memory of 536 4364 WINWORD.EXE 94 PID 536 wrote to memory of 1516 536 cmd.exe 96 PID 536 wrote to memory of 1516 536 cmd.exe 96 PID 536 wrote to memory of 1516 536 cmd.exe 96
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\110986032178b10db54de8e6f047a557.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SYSTEM32\cmd.execmd /c c:\programdata\compsBrCode.hta2⤵
- Process spawned unexpected child process
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\programdata\compsBrCode.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 13564⤵
- Program crash
PID:1120
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1516 -ip 15161⤵PID:4716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52c53aa219cf6af1b52fbf0f43dc8776e
SHA11fdb2cae6c7d4ff6ed975f9b4e49a1e93a5d071c
SHA256a145b75dfa7160e375ff1b3f9ac62e93227fdec550f6f54c6beeb753f6973c79
SHA512946e50c45a24f2d0d4338a2b46bd82ee770c5da7bffbe3542e4a4dce22f7a6d4170067b8169d72c008d829c171e4fa2a128c5e0cf50b71e90bc3c532dc25e43f