Analysis
-
max time kernel
33s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 21:43
Behavioral task
behavioral1
Sample
6a69158fd60658de3fef73faed168c37943382faa9208025c0f4e13115dc0951.doc
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
6a69158fd60658de3fef73faed168c37943382faa9208025c0f4e13115dc0951.doc
Resource
win10v2004-20241007-en
General
-
Target
6a69158fd60658de3fef73faed168c37943382faa9208025c0f4e13115dc0951.doc
-
Size
49KB
-
MD5
18d4a1198b787ded87086c77dbb0b81c
-
SHA1
94c553717ce3cd22fa319490e84689ebd17024c4
-
SHA256
6a69158fd60658de3fef73faed168c37943382faa9208025c0f4e13115dc0951
-
SHA512
bbe7266bc94a0b2bd95ef962dfdf36503da378e580ca91c363a68125b802ef5013202f70797ca445b96d5c1887e9b35493272be026a10631e78a29da2052b4cc
-
SSDEEP
384:Tcx6TNFHiSoqONljlX2EZtRsdF+pC/KBh50jQ:YizCH23+pZ
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.230.135:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
Processes:
DW20.EXEdescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3328 820 DW20.EXE WINWORD.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dwwin.exeWINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dwwin.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
WINWORD.EXEdwwin.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwwin.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 820 WINWORD.EXE 820 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WINWORD.EXEpid process 820 WINWORD.EXE 820 WINWORD.EXE 820 WINWORD.EXE 820 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
WINWORD.EXEpid process 820 WINWORD.EXE 820 WINWORD.EXE 820 WINWORD.EXE 820 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WINWORD.EXEDW20.EXEdescription pid process target process PID 820 wrote to memory of 3328 820 WINWORD.EXE DW20.EXE PID 820 wrote to memory of 3328 820 WINWORD.EXE DW20.EXE PID 3328 wrote to memory of 5080 3328 DW20.EXE dwwin.exe PID 3328 wrote to memory of 5080 3328 DW20.EXE dwwin.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6a69158fd60658de3fef73faed168c37943382faa9208025c0f4e13115dc0951.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 37722⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 37723⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5080
-
-