Resubmissions

04-12-2020 23:26

201204-em2p576lje 4

04-12-2020 23:21

201204-djhepqlp7s 7

04-12-2020 23:16

201204-np79pl4zy2 7

Analysis

  • max time kernel
    106s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-12-2020 23:21

General

  • Target

    view page source hybrid.rtf

  • Size

    46KB

  • MD5

    4dfa2438ea66e13ccd84afca3c410be4

  • SHA1

    9e131830c70fe743b0625637fa407cad525811f5

  • SHA256

    187441262398983e2bf4672e06325e247537e083f9dcf384762858307cc5c8df

  • SHA512

    218ce0bdbf2011864ea3d7b6b733ceadb8c4f93c180fca371c0fb79b8514843dff30c54b483d17e5b9c3743f347e5761ee3fae3d1c8a0d1e5b18cc76fcff277c

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\view page source hybrid.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:580
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe" shell:::{52205fd8-5dfb-447d-801a-d0b52f2e83e1}
    1⤵
      PID:3840
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies registry class
      PID:3028
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localservice -s fdPHost
      1⤵
        PID:2368

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/580-2-0x000001132A920000-0x000001132AF57000-memory.dmp
        Filesize

        6.2MB

      • memory/580-3-0x00007FF91CAE0000-0x00007FF91F603000-memory.dmp
        Filesize

        43.1MB

      • memory/580-4-0x00007FF91CAE0000-0x00007FF91F603000-memory.dmp
        Filesize

        43.1MB

      • memory/580-5-0x00007FF91CAE0000-0x00007FF91F603000-memory.dmp
        Filesize

        43.1MB