Analysis

  • max time kernel
    13s
  • max time network
    15s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 17:09

General

  • Target

    3e4b6e03c85a029e540fada459a6ad2d7e0be276b69e7a799048ae473c01d775.doc

  • Size

    190KB

  • MD5

    e8a4c93a0333c94b03ee3bb527cde854

  • SHA1

    79ca2ee62fc893d1dcc9050d0292f32e33232980

  • SHA256

    3e4b6e03c85a029e540fada459a6ad2d7e0be276b69e7a799048ae473c01d775

  • SHA512

    4fe5bf38e3c810ecd95697f4c75c4a8bc398fc767e7481910875f16fa8470173ba997678a4b097b66968ecaef06a316bb98cda94418fc99303471459782f959f

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3e4b6e03c85a029e540fada459a6ad2d7e0be276b69e7a799048ae473c01d775.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    PID:720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/720-1-0x000001BAC8FD7000-0x000001BAC8FD9000-memory.dmp

    Filesize

    8KB

  • memory/720-0-0x000001BAC8FD9000-0x000001BAC8FDE000-memory.dmp

    Filesize

    20KB

  • memory/720-3-0x000001BAC6E37000-0x000001BAC6E3C000-memory.dmp

    Filesize

    20KB

  • memory/720-2-0x000001BAC8FD7000-0x000001BAC8FD9000-memory.dmp

    Filesize

    8KB

  • memory/720-4-0x000001BAC91E8000-0x000001BAC91ED000-memory.dmp

    Filesize

    20KB

  • memory/720-5-0x000001BAC91E8000-0x000001BAC91ED000-memory.dmp

    Filesize

    20KB

  • memory/720-6-0x000001BAC91E8000-0x000001BAC91ED000-memory.dmp

    Filesize

    20KB