Resubmissions

21-02-2021 18:06

210221-8wax7qzvqx 8

21-02-2021 18:00

210221-vjzsylyfz2 8

21-02-2021 17:56

210221-ae84tv1r2n 8

10-02-2021 15:47

210210-9b99yvj8es 8

10-02-2021 14:59

210210-9m2qxt96q6 8

10-02-2021 14:53

210210-kg5v21dqj6 8

10-02-2021 14:51

210210-z793ybymhe 8

10-02-2021 14:49

210210-vejqem8yk2 8

10-02-2021 14:45

210210-4vmkq6d3bx 8

10-02-2021 14:12

210210-h2rcklwkns 8

Analysis

  • max time kernel
    144s
  • max time network
    138s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-02-2021 14:49

General

  • Target

    IAHRA.doc

  • Size

    90KB

  • MD5

    026e53d4cabe762ed84fafdd6243483d

  • SHA1

    e9f07fd33d7dd014015d018f9d7abe0fb489bb95

  • SHA256

    dd223178e1a516f428a2bcfa790a49eb437651d648fee4d7441dc106cf04df3a

  • SHA512

    0025ebcf6705effde6b20af658cd441aca51cf9c438ba56909de5ca5bb99f1cee561cde0f16003380dfa4058511c68c65fbaafb805ff147728eebe4fc09a98ba

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\IAHRA.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/580-2-0x00007FFD37CB0000-0x00007FFD37CC0000-memory.dmp

    Filesize

    64KB

  • memory/580-3-0x00007FFD37CB0000-0x00007FFD37CC0000-memory.dmp

    Filesize

    64KB

  • memory/580-4-0x00007FFD37CB0000-0x00007FFD37CC0000-memory.dmp

    Filesize

    64KB

  • memory/580-5-0x00007FFD37CB0000-0x00007FFD37CC0000-memory.dmp

    Filesize

    64KB

  • memory/580-6-0x000001381F430000-0x000001381FA67000-memory.dmp

    Filesize

    6.2MB