Analysis

  • max time kernel
    59s
  • max time network
    59s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 17:13

General

  • Target

    1f9da8d9c9ed9e611f84ed4fddb6280272435ce3d7cc0d132c9cd031c89c7be8.doc

  • Size

    196KB

  • MD5

    37dfbb602deb5faaf35dc8b25e554fe2

  • SHA1

    b2d9aa1a02008a8e7830985a3e1c3e4e68aa5565

  • SHA256

    1f9da8d9c9ed9e611f84ed4fddb6280272435ce3d7cc0d132c9cd031c89c7be8

  • SHA512

    c1df5f1a8e09db7438560660f76979bf68d00cce11ae53048bee2df6a1867592660af88918b2657c45bc5931c7b37d92013409639ce2b101f760e1b4605a964b

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1f9da8d9c9ed9e611f84ed4fddb6280272435ce3d7cc0d132c9cd031c89c7be8.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Enumerates system info in registry
    • Checks processor information in registry
    PID:3588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3588-0-0x000001D670A8C000-0x000001D670A8E000-memory.dmp

    Filesize

    8KB

  • memory/3588-1-0x000001D670A8E000-0x000001D670A93000-memory.dmp

    Filesize

    20KB

  • memory/3588-2-0x000001D670D39000-0x000001D670D3E000-memory.dmp

    Filesize

    20KB

  • memory/3588-3-0x000001D670D39000-0x000001D670D3E000-memory.dmp

    Filesize

    20KB

  • memory/3588-4-0x000001D670D39000-0x000001D670D3E000-memory.dmp

    Filesize

    20KB