Managed XDR
Group-IB MDP Report
File info
Filename: autorecovery-save-of-brunei.rtf.asd
File Type: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: Sean Morton, Template: Normal.dotm, Last Saved By: Sean Morton, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Wed Apr 3 15:45:00 2024, Last Saved Time/Date: Wed Apr 3 15:46:00 2024, Number of Pages: 1, Number of Words: 5, Number of Characters: 33, Security: 0
File Size: 95 KB
Env info
win7/x86 en
Hashes
SHA1: 85a414ae79465854dd830b5a8174cb3e2978237e
SHA256: bf2c2aa58d9d69e08ec68e59cb31ce26801262974fabb2feb87140f30e9dc0c9
MD5: 0c60617014d2c7a487297e4f223e6dd5
Signatures
Execution
T1059.001 suspicious_powershell: Creates suspicious powershell process
T1059.001 suspicious_process: Spawns a suspicious process
T1059.005 obfuscated_vbs: Detected obfuscated VBS
T1059.001 url_cmdline: Cmdline of process contains URL
T1059.003 url_cmdline: Cmdline of process contains URL
Privilege Escalation
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1070 stealth_window: A process created a hidden window
T1027 obfuscated_vbs: Detected obfuscated VBS
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
T1497.001 antivm_queries_computername: Retrieves the computer name
Discovery
T1518 locates_browser: Attempts to identify where browsers are installed
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
T1497.001 antivm_queries_computername: Retrieves the computer name
Other
office_embedded: Office document contains embedded executable file(s)
creates_suspended_process: Creates suspended process
get_policy_info: Retrieves information about a Policy object
test_check_service: Starts services
antisandbox_check_graphics_card: Uses CreateDXGIFactory, potentially to detect graphics card
checktokenmembership: Checks user token with CheckTokenMembership call
yara_rules: Static rules
Managed XDR