Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-03-2021 08:08

General

  • Target

    condiz_03.21.doc

  • Size

    213KB

  • MD5

    26b026a5d3c338fc144f4d3f938a7604

  • SHA1

    5f79ff0c3ae9e54da74713119fdf1f1ed91104d7

  • SHA256

    621503b3df5c5894eeea6f8ac52479538024caab4dd8c4dd4ec8c2401f05294a

  • SHA512

    f0ddc4c9954b4d3ab190cdaf6c1b88a8b60b16efb6c96d255e83fb3278b89d8f0dece545676a15d0b546420565c3be3280185a26129052278ce526bfce7c8b95

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\condiz_03.21.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:496

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/496-2-0x00007FF7E5FB0000-0x00007FF7E5FC0000-memory.dmp
    Filesize

    64KB

  • memory/496-3-0x00007FF7E5FB0000-0x00007FF7E5FC0000-memory.dmp
    Filesize

    64KB

  • memory/496-4-0x00007FF7E5FB0000-0x00007FF7E5FC0000-memory.dmp
    Filesize

    64KB

  • memory/496-5-0x00007FF7E5FB0000-0x00007FF7E5FC0000-memory.dmp
    Filesize

    64KB

  • memory/496-6-0x00007FF805380000-0x00007FF8059B7000-memory.dmp
    Filesize

    6.2MB

  • memory/496-7-0x000001D7B0E60000-0x000001D7B0E64000-memory.dmp
    Filesize

    16KB