Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
a84b3dd5f7d29d8d257fdef0ede512ae09e6cd5be7681b9466a5c60f6f877c2b.docx
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a84b3dd5f7d29d8d257fdef0ede512ae09e6cd5be7681b9466a5c60f6f877c2b.docx
Resource
win10v2004-20240802-en
General
-
Target
a84b3dd5f7d29d8d257fdef0ede512ae09e6cd5be7681b9466a5c60f6f877c2b.docx
-
Size
281KB
-
MD5
3d9961991e7ae6ad2bae09c475a1bce8
-
SHA1
69069ac1c9bdc97ff1d060d4fc9f42b91c25669b
-
SHA256
a84b3dd5f7d29d8d257fdef0ede512ae09e6cd5be7681b9466a5c60f6f877c2b
-
SHA512
7df0622f888a219c106bb90bf0e2d5ebbb293b65925173f2c483090a9f343f22d646f79e2a2f9329f54056ce6b40262f7082ba4d4cca1408229a4ea294217117
-
SSDEEP
6144:0zpuMrC2oYig5CHsYRVvtfEgyMSis18NGi8PwbyxiE0/ypN4:01uMnbC1VCXwR8PIKZzN4
Malware Config
Signatures
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3384 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3084 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4720 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2104 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1496 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1644 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1824 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4872 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3464 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2396 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4244 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3424 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 232 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3476 1556 FLTLDR.EXE 83 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4184 1556 FLTLDR.EXE 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_2e89 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-4063907372-1594942930-1051733932-1844641974-2508478874-1868625955-1967953503\Moniker = "oice_16_974fa576_32c1d314_1c95" WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-4063907372-1594942930-1051733932-1844641974-2508478874-1868625955-1967953503\Children WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2726237095-1366774357-4014831957-90954878-2347305837-3606362640-1562521375 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_15e4 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-278151657-848970533-261882865-2229687219-2006365778-1636048864-3347139965\Moniker = "oice_16_974fa576_32c1d314_e3d" WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_28cc\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1505538452-1152410967-1426394730-540222427-2058778797-3081494802-795281858 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-27948448-2302579390-4255464318-324818912-862329575-876842808-3708048328\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_10ed WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-4272257092-4159744599-4187136138-2420700748-1866538305-2956101335-4087140765\Moniker = "oice_16_974fa576_32c1d314_3f58" WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1c95\Children WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_2e16\Children WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1076596690-1524903486-2161919487-2986624745-1900072151-2024854299-2146409775 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_28cc WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-250250770-2760743534-4084678722-2939154160-377398095-1336344383-2708948440\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-4063907372-1594942930-1051733932-1844641974-2508478874-1868625955-1967953503 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1505538452-1152410967-1426394730-540222427-2058778797-3081494802-795281858\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_11c2\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-48025122-3093182024-1100101180-882844361-831458904-954025252-638171950 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-27948448-2302579390-4255464318-324818912-862329575-876842808-3708048328\DisplayName = "OICE_16_974FA576_32C1D314_2E16" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1360838163-74917911-2170892715-1699325166-1184169829-1060500992-2156667394\Moniker = "oice_16_974fa576_32c1d314_2d43" WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1320095995-407903588-319620293-362774999-2762216493-2253809202-1411099873\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2726237095-1366774357-4014831957-90954878-2347305837-3606362640-1562521375\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-4066038767-2082389723-4143749402-2226008999-3768663570-3224639342-3987028517 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1034372031-2981806494-3836174281-3560798146-1457397451-3074362787-2550747052\Moniker = "oice_16_974fa576_32c1d314_2e89" WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_2d43 WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1320095995-407903588-319620293-362774999-2762216493-2253809202-1411099873 WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1505538452-1152410967-1426394730-540222427-2058778797-3081494802-795281858 WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1505538452-1152410967-1426394730-540222427-2058778797-3081494802-795281858\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1272 WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-27948448-2302579390-4255464318-324818912-862329575-876842808-3708048328 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-27948448-2302579390-4255464318-324818912-862329575-876842808-3708048328\Moniker = "oice_16_974fa576_32c1d314_2e16" WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-4272257092-4159744599-4187136138-2420700748-1866538305-2956101335-4087140765\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1c95 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-278151657-848970533-261882865-2229687219-2006365778-1636048864-3347139965\DisplayName = "OICE_16_974FA576_32C1D314_E3D" WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-278151657-848970533-261882865-2229687219-2006365778-1636048864-3347139965\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1076596690-1524903486-2161919487-2986624745-1900072151-2024854299-2146409775 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_369d\Children WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7800310000000000025984631100557365727300640009000400efbe874f7748135948a52e000000c70500000000010000000000000000003a000000000051291b0155007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1320095995-407903588-319620293-362774999-2762216493-2253809202-1411099873\Moniker = "oice_16_974fa576_32c1d314_10ed" WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_910 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2726237095-1366774357-4014831957-90954878-2347305837-3606362640-1562521375 WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1272\Children WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1034372031-2981806494-3836174281-3560798146-1457397451-3074362787-2550747052\DisplayName = "OICE_16_974FA576_32C1D314_2E89" WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1034372031-2981806494-3836174281-3560798146-1457397451-3074362787-2550747052 WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1876849547-1925166113-606388922-3192489609-1982683668-2469370247-3518881747\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_e6d\Children WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-70644376-28312031-4168778011-2980513004-711556732-2695983072-2260092777\DisplayName = "OICE_16_974FA576_32C1D314_15E4" WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-250250770-2760743534-4084678722-2939154160-377398095-1336344383-2708948440\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-4272257092-4159744599-4187136138-2420700748-1866538305-2956101335-4087140765\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1c95 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\https:\moittadvisory.pmd-offc.info\moitt\755092\doc.rtf WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1556 WINWORD.EXE 1556 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 1556 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1556 wrote to memory of 3384 1556 WINWORD.EXE 86 PID 1556 wrote to memory of 3384 1556 WINWORD.EXE 86 PID 1556 wrote to memory of 3084 1556 WINWORD.EXE 90 PID 1556 wrote to memory of 3084 1556 WINWORD.EXE 90 PID 1556 wrote to memory of 4720 1556 WINWORD.EXE 95 PID 1556 wrote to memory of 4720 1556 WINWORD.EXE 95 PID 1556 wrote to memory of 2104 1556 WINWORD.EXE 98 PID 1556 wrote to memory of 2104 1556 WINWORD.EXE 98 PID 1556 wrote to memory of 1496 1556 WINWORD.EXE 99 PID 1556 wrote to memory of 1496 1556 WINWORD.EXE 99 PID 1556 wrote to memory of 1644 1556 WINWORD.EXE 103 PID 1556 wrote to memory of 1644 1556 WINWORD.EXE 103 PID 1556 wrote to memory of 1824 1556 WINWORD.EXE 104 PID 1556 wrote to memory of 1824 1556 WINWORD.EXE 104 PID 1556 wrote to memory of 4872 1556 WINWORD.EXE 105 PID 1556 wrote to memory of 4872 1556 WINWORD.EXE 105 PID 1556 wrote to memory of 3464 1556 WINWORD.EXE 106 PID 1556 wrote to memory of 3464 1556 WINWORD.EXE 106 PID 1556 wrote to memory of 2396 1556 WINWORD.EXE 108 PID 1556 wrote to memory of 2396 1556 WINWORD.EXE 108 PID 1556 wrote to memory of 4244 1556 WINWORD.EXE 109 PID 1556 wrote to memory of 4244 1556 WINWORD.EXE 109 PID 1556 wrote to memory of 3424 1556 WINWORD.EXE 118 PID 1556 wrote to memory of 3424 1556 WINWORD.EXE 118 PID 1556 wrote to memory of 232 1556 WINWORD.EXE 119 PID 1556 wrote to memory of 232 1556 WINWORD.EXE 119 PID 1556 wrote to memory of 3476 1556 WINWORD.EXE 120 PID 1556 wrote to memory of 3476 1556 WINWORD.EXE 120 PID 1556 wrote to memory of 4184 1556 WINWORD.EXE 126 PID 1556 wrote to memory of 4184 1556 WINWORD.EXE 126 PID 1556 wrote to memory of 2268 1556 WINWORD.EXE 127 PID 1556 wrote to memory of 2268 1556 WINWORD.EXE 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a84b3dd5f7d29d8d257fdef0ede512ae09e6cd5be7681b9466a5c60f6f877c2b.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:3384
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:3084
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:4720
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:2104
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:1496
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:1644
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:1824
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:4872
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:3464
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:2396
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:4244
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:3424
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:232
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:3476
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:4184
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\odc.officeapps.live.com\B1DF4106-1391-42AC-A827-6EFF30188DFD
Filesize397B
MD52f82426450332b558a61ae9ca551abd9
SHA1abdbf8f8bdd7572bcdefbd1e0b7da8d3cf17144d
SHA25657d6315a8f1f11aaa111a9956ddd0d560f791f757c379ed77bbb5a1b5b577f52
SHA512dbc43dab6cbde98647c5a88cd508a1528ef79c030286cf82cb4cb03c4af81930ad1c3b2644ead9eceea27cd5772324f42a51f04f1693102254567205a6abf0b5
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\odc.officeapps.live.com\F5B1A0C6-5C35-4AD5-A616-9E22CA0BC067
Filesize1KB
MD585ad173999ed440af6120f3b4fd436fa
SHA1eebe3bae40b0c82db581b905e2a4c4a90055c9b3
SHA2562fb3e7ca57b5ec8657ff2b909c74dee246e7ed2b30abd60dec96fc4fb88bd165
SHA5123c506252a27bc4a3d718fc2ad89036850ee3c9d5fd79966fc5e28debe1844d96e8d2777e160e8537034129fd8109dff027bf5eb4a082c99d0db93730ec31427e
-
Filesize
8B
MD543d35b5b20f491be219ab2eaa172ec55
SHA11327f20512762a533c22fe181be3fcdd29ab76fe
SHA2561955c6914097477d5141f720c9e8fa44b4fe189e854da298d85090cbc338b35a
SHA512a721f07b2aa9c5d723a4b11575a602e94a7973278e62bcb5b54d4a48b5adf1bbe3945e5250dd0ccdd8b1b683b864f8c8b98b7c160118ed84846de085eb1d3666
-
Filesize
50B
MD5a471d39c02ee8428702b468c843c62e3
SHA191e6f53c4dce4d7822f120da20a75113e5a7dced
SHA2560c9a8ce9516edb686faf2bee4bd9dc3285207031fe5f2f742accf4a525518d8e
SHA512806dd530ce299b765554bb6ae827506d63b9d8a24294df4e827ca8b808894c2b8845009239f80282f522177de483d95099e74ef797e6f3b15a2b54f92dffc03b
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
289B
MD59f42270666472c52b3a44669a589aab2
SHA1de532d1f380b177e091e949421efecebd9d7b9db
SHA256d7a25c55a732e8454abc1cc1d37a639ab9b99a04f12e0bdeede300bdee2030ff
SHA51296d6fcd16afbfcab206edd22cf31cbce1d826a6ce5381207aec5620deae1c7b3541efe80544613870ef06551f2b7362ba15fcdb93141ec3177542b0005104749
-
Filesize
12B
MD5f6f801e5b0502f5e803ed826dd37ae44
SHA1273e87aa518397186653443c0c3e81d574361708
SHA256e7bcd23ba708556ee69f96050dc7e74f9dab95825bfab48bcea7fd8fac482fd1
SHA5128fe0217b9c7f9331664dc4259c7924b9c7e5e145f0b795ec98d713e41a2e3d001014b3ac41071fe41447632ddbfbbefc8c7d6de8fa9faeca455a0a78575e5584
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD504ed537b830a03f2af4f7f940a3f7ccf
SHA1f5050339cf6344f53bbbf1c820e55e54d3120b88
SHA256d9043f16dfe3f89bd686fdc3fd65ee2bf2bb85e3a82836e32ed29a46bbed13e4
SHA51258a8fa229876f3ad1f6bda9d87643c0d03fa36de4c9574988086a2a93360f988b48421051b89c8c5c643eebf06e8424a881ab07da64841b91332a95f94d0a163
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD50eb25d8d5cbfb89a49a23d65d5503410
SHA181827b83b2479c09b5e4084f6e7497910b1b2487
SHA256f17b7a4b15f221c1e394fa957e381987e6486279f300aaac5fd42924725d4644
SHA512e0bb46f4386099971e98f23051c2616dfa0ed56c46520da83cd11efa1ee5ecb7b4f2a3d46ec7964b9bc6d90d3ce6a681e3e4d3f97a14481de618bc10448d004a
-
Filesize
324KB
MD5945484c112a8efcfbffd167b4ac803ae
SHA1686c648517ec8e80ba915ca141d79f257291b1f6
SHA256eda7e722b67ba020ee2efed066c6a25c0377eaa630f2015d67301dd6fa62bec9
SHA512b57d14262ed857666d8af869ec4d8c77e6032c4d0f3b075dda0b5f8dfdd38b02f3c342b10cce1884ebfce0814456fb2a09706a40aba918ebd87d0f95e44c5b43