Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    19-04-2021 10:52

General

  • Target

    Purchase Order From Hanon systems Ltd.doc.rtf

  • Size

    1.2MB

  • MD5

    d9a7f66522882d74a20738f1c3d2681f

  • SHA1

    b5a13dea22b2da04d1147c292f1f8d8ac39d777d

  • SHA256

    777f7cc25c596f6617f5750b2ef83ab0c5b439fac67153224290e83aceca9214

  • SHA512

    74f5ea5ee011c243fed3d94f15382e51e09705ac890767e11954978e5b81d56c2f9d233fb59052d2828516dd50e919355a51af134179ad392bb14f6c43eac916

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Purchase Order From Hanon systems Ltd.doc.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4440-114-0x00007FF9B4570000-0x00007FF9B4580000-memory.dmp
    Filesize

    64KB

  • memory/4440-115-0x00007FF9B4570000-0x00007FF9B4580000-memory.dmp
    Filesize

    64KB

  • memory/4440-116-0x00007FF9B4570000-0x00007FF9B4580000-memory.dmp
    Filesize

    64KB

  • memory/4440-117-0x00007FF9B4570000-0x00007FF9B4580000-memory.dmp
    Filesize

    64KB

  • memory/4440-119-0x00007FF9B4570000-0x00007FF9B4580000-memory.dmp
    Filesize

    64KB

  • memory/4440-118-0x00007FF9D65A0000-0x00007FF9D90C3000-memory.dmp
    Filesize

    43.1MB

  • memory/4440-122-0x00007FF9D0AC0000-0x00007FF9D1BAE000-memory.dmp
    Filesize

    16.9MB

  • memory/4440-123-0x00007FF9CD9E0000-0x00007FF9CF8D5000-memory.dmp
    Filesize

    31.0MB