Resubmissions

13-02-2020 18:49

200213-1rnt9xv6f2 1

13-02-2020 18:42

200213-bsz7jwmhe6 1

13-02-2020 18:39

200213-zffwcb2g7j 1

Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v191014
  • submitted
    13-02-2020 18:39

General

  • Target

    Form.docm

  • Size

    260KB

  • MD5

    c2b48d21764b195fb0ebbdd3d1bdd89a

  • SHA1

    d8ca2aaba616f0281255a10634b6c4e17bb59336

  • SHA256

    186ec909dc32c982ab4bd6b257bb25a2726df856d4cf6c829e06683c352c92b2

  • SHA512

    c975a51bcf4cef1c345fcdadc59bd6b78ceeb96179b1c9621ef6070848f8452d8235b1d66223154edc7106cbe5d800e538a436c51e09f3828bf801849f740705

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Form.docm" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:4996

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4996-0-0x000001E457B30000-0x000001E457B34000-memory.dmp
    Filesize

    16KB

  • memory/4996-2-0x000001E457B30000-0x000001E457B34000-memory.dmp
    Filesize

    16KB