Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
PurchaseXOrderXNo.4036041334.docx
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
PurchaseXOrderXNo.4036041334.docx
Resource
win10v2004-20240508-en
General
-
Target
PurchaseXOrderXNo.4036041334.docx
-
Size
16KB
-
MD5
e1d91cae0bc5e4510f6a07c38ed9db1f
-
SHA1
0d1288b1c6ca2e30910712c5e0d881a8b54caaa2
-
SHA256
15479d24a288ccce5ac421de34259518026761dde5f452bc1756fb557b09cfee
-
SHA512
37a8b983183ba1acba1254b3c323d8a1becace5a0d305ed977fa2f85df93184b5a24c57b861a8952a808b1932ce75353133b5a30fff218d382caf23227215d8b
-
SSDEEP
384:tyXLyi0WVs8PL8wi4OEwH8TIbE91r2fRXJYsvi1x3egCy:tcLm65P3DOqnYJ5Zvcx3eg7
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4044 4440 MsoSync.exe 81 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 MsoSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MsoSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MsoSync.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS MsoSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily MsoSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU MsoSync.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4440 WINWORD.EXE 4440 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeAuditPrivilege 4440 WINWORD.EXE Token: SeAuditPrivilege 4044 MsoSync.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4044 MsoSync.exe 4044 MsoSync.exe 4044 MsoSync.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4044 MsoSync.exe 4044 MsoSync.exe 4044 MsoSync.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4440 WINWORD.EXE 4440 WINWORD.EXE 4440 WINWORD.EXE 4440 WINWORD.EXE 4440 WINWORD.EXE 4440 WINWORD.EXE 4440 WINWORD.EXE 4440 WINWORD.EXE 4044 MsoSync.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4440 wrote to memory of 4044 4440 WINWORD.EXE 95 PID 4440 wrote to memory of 4044 4440 WINWORD.EXE 95
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PurchaseXOrderXNo.4036041334.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files\Microsoft Office\Root\Office16\MsoSync.exe"C:\Program Files\Microsoft Office\Root\Office16\MsoSync.exe"2⤵
- Process spawned unexpected child process
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD57e5b28912c7f83368e8efea012d02ed2
SHA19b81e48ccaa35ac3da9eb70d549f423a22aa4dfd
SHA256469b0163ddbd7f2f8e98b6a0f8e453fe2feaa4793aa1bf20cb8f62b9794f5f1a
SHA512c98d6271fb8da9ef620f6a2ddba113710c6a1fc7e2ed686db63e0df5f89f15b43c52a024f016e7ab8fdea1ba606f0fa3f56fea191310524fb8c8728b096983fa
-
Filesize
128B
MD5e438cf53da1d0c1d6d62a9d9bb681126
SHA10354537896ce46360052aeb3b19bc85028c4dbd8
SHA2567640f896131970903533d56469c1af47947a312451d1d683154a7d44a1aea341
SHA512823f202d11be2f204f68d04963ac319ab64d845a5aa8e8228cc68e6025031eb1cc7bda5ffc09a7e1a63b33300adab34e2e4b1bff59ad4bb187f2228b9d8948bd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84