Analysis

  • max time kernel
    13s
  • max time network
    15s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 17:18

General

  • Target

    17649aa7c5391a0f362e6c8f19665ad418b3ddaa2fe2924d455674760721d0ed.doc

  • Size

    194KB

  • MD5

    3c23c4a87b4f7d3140895bc7f86975f5

  • SHA1

    7c5e319926176645abc27975ecac7158d4efd01b

  • SHA256

    17649aa7c5391a0f362e6c8f19665ad418b3ddaa2fe2924d455674760721d0ed

  • SHA512

    918dfd52ab84a6a5f23fde3d15ce7e4c03b16ab77d9c7dffbdcce6f7e35d235ce231089786e91a4d1a23c38eb2c02ff6e01747f2c9b35ee3e177609af0caf8b3

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\17649aa7c5391a0f362e6c8f19665ad418b3ddaa2fe2924d455674760721d0ed.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:3900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3900-0-0x00000212EBD21000-0x00000212EBD26000-memory.dmp

    Filesize

    20KB

  • memory/3900-1-0x00000212EBD1C000-0x00000212EBD21000-memory.dmp

    Filesize

    20KB

  • memory/3900-2-0x00000212EBD21000-0x00000212EBD26000-memory.dmp

    Filesize

    20KB

  • memory/3900-3-0x00000212E9DB1000-0x00000212E9DB3000-memory.dmp

    Filesize

    8KB