Analysis
-
max time kernel
9s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 22:12
Behavioral task
behavioral1
Sample
e88b8049397c21d470396692ef208d696364e36e556690297779cf68e311a9e6.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e88b8049397c21d470396692ef208d696364e36e556690297779cf68e311a9e6.doc
Resource
win10v2004-20240709-en
General
-
Target
e88b8049397c21d470396692ef208d696364e36e556690297779cf68e311a9e6.doc
-
Size
893KB
-
MD5
32248c17f968e76bbe8b90ea3be8f6f9
-
SHA1
0d5318656d07f6a071b2ca3db6a96da387873941
-
SHA256
e88b8049397c21d470396692ef208d696364e36e556690297779cf68e311a9e6
-
SHA512
92213947b957c90aecf00df21b795018a174aa1aab38d42c4e8b93124429adc7ce1d599698834805103fd7c6f2a6bae0700305c3a692a43e1a9c74950137947b
-
SSDEEP
24576:jEIZ4wAK74NAx5KxZTBG75gdLtYkzyHtSD:j+wZ74Nx3c75OyWyHt
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1280 4968 cmd.exe WINWORD.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 45 api.ipify.org -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEcmd.exepid process 4424 PING.EXE 1280 cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\{DEAF4CBB-7A2B-46EC-8908-0E412F1A6565}\zoro.kl:Zone.Identifier WINWORD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4968 WINWORD.EXE 4968 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
WINWORD.EXEpid process 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 4968 wrote to memory of 4328 4968 WINWORD.EXE splwow64.exe PID 4968 wrote to memory of 4328 4968 WINWORD.EXE splwow64.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e88b8049397c21d470396692ef208d696364e36e556690297779cf68e311a9e6.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4328
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c ping localhost -n 10 & rundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\iff.bin,GWCRALYCYIAUAFG2⤵
- Process spawned unexpected child process
- System Network Configuration Discovery: Internet Connection Discovery
PID:1280 -
C:\Windows\system32\PING.EXEping localhost -n 103⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4424
-
-
C:\Windows\system32\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\iff.bin,GWCRALYCYIAUAFG3⤵PID:3496
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\iff.bin,GWCRALYCYIAUAFG4⤵PID:4256
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5ffb63dc6ca8cb27f9d6a0141da1482c8
SHA11e5b332cefb686a169e1198cbc3c2a95e6e6692b
SHA25622cb1cd8c46465ed697881645d7fbad3ad5b4b460b1f89d905f9c128d7f9f5b8
SHA512740bd4881f54f2e35123984b00397c04712f56b20c21eceed0a5620e34c210a1789ca801592ba442c4e5651dfb00658466e9bb8ae64fbbfe34d576470f920926
-
Filesize
312B
MD5d1cf01b6e11801f536a5de93c1ec8490
SHA1158b76b6bed66e02cbed5e0e6149aa3f84b8cff8
SHA256d8293f31dbfed6ba5654d83b811847c5acde6c7b7c337aef41ab52b3fbbc125e
SHA512d073e6a8013f5c9b004e2c0527f0def1a103c311431a64b2f8c65409c877c74ce33867fba175ecab03e11ea53054b48ccda8ec01e1a7f7fc8fdaa651ecc0432e
-
Filesize
285KB
MD5c454093f21d7862bb0d966d74d4a45a3
SHA11cb807819ebecd9f136a7aa0dd33de1c19ba664b
SHA25661e4a618ed522ff01ad8b609d3b0aeca35b11502c440a5f6d56594c942b93e7a
SHA512fc51d1ec8244cb31ede178da97053d0672b2f8a1378b9f491c2b4a00833a97f3ad6c8bbce130745208858983c6cf575baa2a8adbfd4a3ff1d7fa9d745e032356
-
Filesize
1.9MB
MD5a93f9ecb20354d450b0443b63808c5ef
SHA195ac8afcf79459b8670dc932b39ac752d0c0ab1d
SHA256245dd0bff1c08559e5e68ea25aadbf5bc6ebef5831ec19c34d8d2021747157fe
SHA5121e2b42b2ca2fda92f5104cce1a7a9a63b20694b999bd4685da44a5178b002a1f0ed47c581006437f48616224f3e03f667fdd674e687e6d56d6818979fcdc5838