Managed XDR
Group-IB MDP Report
File info
Filename: c-users-user-desktop-design.docx-copy
File Type: Microsoft Word 2007+
File Size: 12.6 KB
Env info
win7/x86 en
Hashes
SHA1: c47c22c21fec6b63fc7c0da55e128ec40d6495a9
SHA256: 7937f22f6fb20a5e485d86559c7881a0ec8ce2a1dc9eb4a7491d5e1fee8cfa48
MD5: c9759858c9fb0ff1f61d6963f943ad7b
Signatures
Initial Access
T1192 downloader_ms_word: Suspicious link to an external file (Microsoft Word)
Execution
T1203 exploit_CVE_2017_0199: Possible exploitation of CVE-2017-0199
T1204.002 mimics_extension: Attempts to mimic the file extension
Privilege Escalation
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1036 mimics_extension: Attempts to mimic the file extension
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1497 evasion_trustrecords: Attempts to detect Sandbox exploring trusted documents
T1497.001 antivm_queries_computername: Retrieves the computer name
Credential Access
T1552 cookie_files: Accesses cookie files
T1555.003 cookie_files: Accesses cookie files
Discovery
T1083 checks_recent_files: Attempt to check recently opened files through registry
T1135 server_share_info: Retrieves information about each shared resource on a server
T1497 evasion_trustrecords: Attempts to detect Sandbox exploring trusted documents
T1497.001 antivm_queries_computername: Retrieves the computer name
Command and Control
T1071.001 network_http: Performs HTTP requests
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
T1071.001 wininet_https: Performs HTTP/HTTPS requests using WinInet
Other
suricata_alert: Malicious traffic detected
creates_doc: Creates (office) documents in the file system
unexpected_exception: Unexpected exception
create_rpc_bindings: Creates RPC connection
get_policy_info: Retrieves information about a Policy object
test_check_service: Starts services
antisandbox_check_graphics_card: Uses CreateDXGIFactory, potentially to detect graphics card
Managed XDR