Analysis

  • max time kernel
    146s
  • max time network
    138s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    11-05-2021 05:18

General

  • Target

    PL_017542000.doc

  • Size

    467KB

  • MD5

    f4e2b625051dd9283bbec085e56d0ab1

  • SHA1

    118cae287ef1505bf04f75d5811c340ea01fa949

  • SHA256

    f6e0f11f26c59925ad1bd23c4dc586de71af0863d7273ad41a17efd92384167c

  • SHA512

    05b3d3e1181265359cd1264f3d9b07f5d04da696791877c98f5a9a437aba4e00b35e231c76b3f7a948fd5bf1794ca1d807a04b44a523ca378971986056b98c2b

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PL_017542000.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4008

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4008-114-0x00007FFF77040000-0x00007FFF77050000-memory.dmp
    Filesize

    64KB

  • memory/4008-115-0x00007FFF77040000-0x00007FFF77050000-memory.dmp
    Filesize

    64KB

  • memory/4008-116-0x00007FFF77040000-0x00007FFF77050000-memory.dmp
    Filesize

    64KB

  • memory/4008-117-0x00007FFF77040000-0x00007FFF77050000-memory.dmp
    Filesize

    64KB

  • memory/4008-119-0x00007FFF77040000-0x00007FFF77050000-memory.dmp
    Filesize

    64KB

  • memory/4008-118-0x00007FFF97DD0000-0x00007FFF9A8F3000-memory.dmp
    Filesize

    43.1MB

  • memory/4008-122-0x00007FFF92A50000-0x00007FFF93B3E000-memory.dmp
    Filesize

    16.9MB

  • memory/4008-123-0x00007FFF90A20000-0x00007FFF92915000-memory.dmp
    Filesize

    31.0MB