Analysis
-
max time kernel
101s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 19:50
Behavioral task
behavioral1
Sample
adjure.04.30.2021.docm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adjure.04.30.2021.docm
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
jaazci2.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
jaazci2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
leftTitleRepo.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
leftTitleRepo.dll
Resource
win10v2004-20240226-en
General
-
Target
adjure.04.30.2021.docm
-
Size
76KB
-
MD5
9749a2caec0f624162f5face69dee4b6
-
SHA1
fb2135c7ca8b93a84a5e42fe4d6b844c21b7936c
-
SHA256
b3dbdf013c494dc354374a50e95635d53d2dabfc59527a17a5f104e8deb07554
-
SHA512
29ac52a776927704ca72e5c26d1dbfce9bc8218371efb30f847b94714460816bcd8953d141dfdeaa9f31a6d2a879a302f2498edfb4aad2adcd927571bdb744c0
-
SSDEEP
1536:jTcpJQrigxDjV+l0rM81NCGCPisEHOAq4eyO6i1itW7YUvOMkksCLlg33h:jyJQe6nnrxRCPdYZuyL3t5UmMkkoHh
Malware Config
Signatures
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3164 1116 DW20.EXE 87 -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwwin.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 1872 WINWORD.EXE 1872 WINWORD.EXE 1116 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1116 WINWORD.EXE 1116 WINWORD.EXE 1116 WINWORD.EXE 1116 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1872 WINWORD.EXE 1872 WINWORD.EXE 1872 WINWORD.EXE 1872 WINWORD.EXE 1116 WINWORD.EXE 1116 WINWORD.EXE 1116 WINWORD.EXE 1116 WINWORD.EXE 1116 WINWORD.EXE 1116 WINWORD.EXE 1116 WINWORD.EXE 1116 WINWORD.EXE 1116 WINWORD.EXE 1116 WINWORD.EXE 1872 WINWORD.EXE 1872 WINWORD.EXE 1872 WINWORD.EXE 1872 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1116 wrote to memory of 3164 1116 WINWORD.EXE 90 PID 1116 wrote to memory of 3164 1116 WINWORD.EXE 90 PID 3164 wrote to memory of 4804 3164 DW20.EXE 91 PID 3164 wrote to memory of 4804 3164 DW20.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\adjure.04.30.2021.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1872
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 10082⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 10083⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5cf790a6fb9d27b7a3296b45f12f7645a
SHA1c977c6daa0df11a1bb50b5a10d0e1191b6c714d1
SHA256140f46a2a63b0fe36acf66ad02a76a9642464fff921f880c36cc5bc9fe53365d
SHA512218dc46ff230c5e77c07c41fcd76562fe487963ccd80cc38fd0c436af35d4fa894ca1f5c039b45aade7964e6d254dd5febf50f221d5d6be8c160670bfe53ae6d
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD58139bb0c594742f8153b3f0c3ac44842
SHA105edf856c02766c24bdddd273f9c679c0314b046
SHA256d7d64cdb6036c655400be2a58e8601fb52d8b5095f01d9c9fee8c7c0fad75f7a
SHA51258eada035efcd7562e71be41efe42f23cc5d8da771977f38df5f951aa271b851d6663bff23bdc40d673cb36abbfc2ec439c0d9508a8341057f887cc8ecd1639d