Analysis

  • max time kernel
    34s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 02:14

General

  • Target

    fd15363835636b0455cd31ed7860dfbc3d06b14cc172e02d68afd26f3962a10f.doc

  • Size

    62KB

  • MD5

    8cf2a878780f9f16e7dd5ce997ee9a97

  • SHA1

    0f5c26827acc179f7619b847a21de4e63b7bddce

  • SHA256

    fd15363835636b0455cd31ed7860dfbc3d06b14cc172e02d68afd26f3962a10f

  • SHA512

    e0ba84a3667ee46a042b167a624dcf3c14c2de28cba94dcba1afb6f035c6b52eddeec26a02fff4e2b4ef1ed9fea330169a302d979b7563c37db7903354e1b13d

  • SSDEEP

    768:8ooSooooUatoXoooonooqoooUoooooIooUpJcaUitGAlmrJpmxlzC+w99NBD3y6L:QptJlmrJpmxlRw99NB7yZhERepNiqwC

Score
6/10

Malware Config

Signatures

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fd15363835636b0455cd31ed7860dfbc3d06b14cc172e02d68afd26f3962a10f.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 4572
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 4572
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:4856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1660-12-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-50-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-0-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/1660-4-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/1660-1-0x00007FFD4010D000-0x00007FFD4010E000-memory.dmp

    Filesize

    4KB

  • memory/1660-5-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-6-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-8-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-10-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-14-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-2-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/1660-3-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/1660-11-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-9-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-15-0x00007FFCFE090000-0x00007FFCFE0A0000-memory.dmp

    Filesize

    64KB

  • memory/1660-7-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/1660-28-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-25-0x00007FFD40070000-0x00007FFD40265000-memory.dmp

    Filesize

    2.0MB

  • memory/1660-13-0x00007FFCFE090000-0x00007FFCFE0A0000-memory.dmp

    Filesize

    64KB

  • memory/2324-49-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/2324-48-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/2324-47-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB

  • memory/2324-46-0x00007FFD000F0000-0x00007FFD00100000-memory.dmp

    Filesize

    64KB