Analysis

  • max time kernel
    117s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    26-10-2021 08:54

General

  • Target

    工行支ä»_é_šçŸ¥ - ICBC Payment Advice (Ref MT10385748472).docx

  • Size

    10KB

  • MD5

    431ce22a09ba2fdbf2818559a8e3d765

  • SHA1

    4d2a4167f1c115b5cc13348a91adc7ff8a86be91

  • SHA256

    dd5a8452993e5300474923f6f48b666bc7157254298568c9325367e35f86f203

  • SHA512

    60697715fde6092ecf4a9efbbdf3c20e74b9e903eeac40efe87afc345e03f519114d5e1a333c4f2ef3bbca6580f6b5c41931f15e6323bd942ea8abe7b1b515fd

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\工行支ä»_é_šçŸ¥ - ICBC Payment Advice (Ref MT10385748472).docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4268

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4268-116-0x00007FF8DD160000-0x00007FF8DD170000-memory.dmp
    Filesize

    64KB

  • memory/4268-117-0x00007FF8DD160000-0x00007FF8DD170000-memory.dmp
    Filesize

    64KB

  • memory/4268-118-0x00007FF8DD160000-0x00007FF8DD170000-memory.dmp
    Filesize

    64KB

  • memory/4268-119-0x00007FF8DD160000-0x00007FF8DD170000-memory.dmp
    Filesize

    64KB

  • memory/4268-120-0x000001B03F820000-0x000001B03F822000-memory.dmp
    Filesize

    8KB

  • memory/4268-121-0x000001B03F820000-0x000001B03F822000-memory.dmp
    Filesize

    8KB

  • memory/4268-122-0x00007FF8DD160000-0x00007FF8DD170000-memory.dmp
    Filesize

    64KB

  • memory/4268-123-0x000001B03F820000-0x000001B03F822000-memory.dmp
    Filesize

    8KB

  • memory/4268-140-0x000001B03F820000-0x000001B03F822000-memory.dmp
    Filesize

    8KB