Analysis
-
max time kernel
132s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
667f53c1003e7fe1bb14c04721893a3a.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
667f53c1003e7fe1bb14c04721893a3a.doc
Resource
win10v2004-20231222-en
General
-
Target
667f53c1003e7fe1bb14c04721893a3a.doc
-
Size
72KB
-
MD5
667f53c1003e7fe1bb14c04721893a3a
-
SHA1
c379bd767de2ba8c1189808e006e3256c647662a
-
SHA256
49025f29f934288c5757cb19b273447681a7f74b169dfee5fa3d204bfb664a0a
-
SHA512
4f71b56f6859c2bcef4f4d7b76c38af8d2559eba6f3199e56e8e7f584934f3531c7fcc7ec755d6db14f676e378a499cd03276f04a09dd2e23a4a524420450656
-
SSDEEP
1536:EYntJ1rHr11AQYyqGJHQYCDEtU6dLTR97c8KpeROJ6KrKSRKFG8xpdG8oYRZLgmw:zb1dxQYNtU6Zvc8KpeROJ6KrKSRKFG8G
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4640 3380 cmd.exe 14 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3380 WINWORD.EXE 3380 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE 3380 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3380 wrote to memory of 4640 3380 WINWORD.EXE 50 PID 3380 wrote to memory of 4640 3380 WINWORD.EXE 50 PID 4640 wrote to memory of 524 4640 cmd.exe 57 PID 4640 wrote to memory of 524 4640 cmd.exe 57 PID 4640 wrote to memory of 524 4640 cmd.exe 57
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\667f53c1003e7fe1bb14c04721893a3a.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SYSTEM32\cmd.execmd.exe /s /c c:\\programdata\\index.hTA2⤵
- Process spawned unexpected child process
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\programdata\index.hTA" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:524
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ee3ea82e681632eeb1b86bb2309fecde
SHA14ffa99969366a11e23b7cdedbbd673a5a0230a37
SHA256443b02b1615e2dcc6daba16b8bad23efe2b0000436a98dc4a3f0af35e825fdb6
SHA51207ffb009b45f1d6545f66bc9c7a56d72987bcd46b295afbb61f14be7bbf4f2068785bcc4ac46794778e17cbb203d9f450e2bc6a44cb2f47895422838d3536388