Analysis

  • max time kernel
    33s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 07:37

General

  • Target

    1eeb63beb49968b32d0b451613059ef29957b922cf7c5cd170c4257eed7ff5a5.doc

  • Size

    38KB

  • MD5

    e353fed1111bf8f52bcfdf1bf3400952

  • SHA1

    39878ea251e2e4ab33a8f94f36a664940d7debd4

  • SHA256

    1eeb63beb49968b32d0b451613059ef29957b922cf7c5cd170c4257eed7ff5a5

  • SHA512

    e295a6f2339bc6eb79ee7645bed658669df5440b68805bbe2cffd6333b16ffa5890b1b6c463fd269fb70fb8194f9c9163a4a672d18f92f666debf81c98a5b6f6

  • SSDEEP

    384:W2IiSgq03gBapIkZ+Rmg+40oqI8CkxQaH50jTcw8Uxt:/G03gmZs0oqI8PxQaZjI

Score
6/10

Malware Config

Signatures

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1eeb63beb49968b32d0b451613059ef29957b922cf7c5cd170c4257eed7ff5a5.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4340
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 3692
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:432
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 3692
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:4024

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/432-59-0x00007FF80CA90000-0x00007FF80CAA0000-memory.dmp

          Filesize

          64KB

        • memory/432-57-0x00007FF80CA90000-0x00007FF80CAA0000-memory.dmp

          Filesize

          64KB

        • memory/432-58-0x00007FF80CA90000-0x00007FF80CAA0000-memory.dmp

          Filesize

          64KB

        • memory/432-60-0x00007FF80CA90000-0x00007FF80CAA0000-memory.dmp

          Filesize

          64KB

        • memory/4340-15-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-11-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-6-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-7-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-9-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-8-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-12-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-13-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-0-0x00007FF80CA90000-0x00007FF80CAA0000-memory.dmp

          Filesize

          64KB

        • memory/4340-16-0x00007FF80A6E0000-0x00007FF80A6F0000-memory.dmp

          Filesize

          64KB

        • memory/4340-14-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-5-0x00007FF84CAAD000-0x00007FF84CAAE000-memory.dmp

          Filesize

          4KB

        • memory/4340-10-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-18-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-17-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-19-0x00007FF80A6E0000-0x00007FF80A6F0000-memory.dmp

          Filesize

          64KB

        • memory/4340-37-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-41-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB

        • memory/4340-4-0x00007FF80CA90000-0x00007FF80CAA0000-memory.dmp

          Filesize

          64KB

        • memory/4340-1-0x00007FF80CA90000-0x00007FF80CAA0000-memory.dmp

          Filesize

          64KB

        • memory/4340-3-0x00007FF80CA90000-0x00007FF80CAA0000-memory.dmp

          Filesize

          64KB

        • memory/4340-2-0x00007FF80CA90000-0x00007FF80CAA0000-memory.dmp

          Filesize

          64KB

        • memory/4340-61-0x00007FF84CA10000-0x00007FF84CC05000-memory.dmp

          Filesize

          2.0MB