Analysis

  • max time kernel
    121s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    04-11-2021 01:28

General

  • Target

    SMC INQUIRY.doc

  • Size

    1.6MB

  • MD5

    c3f435c1711eb57e13acd2cb1fdf04a2

  • SHA1

    a4cedd66c27cf1aaed9ebf9fc0deb1f82dc937c3

  • SHA256

    88d6f042585c2e129d891c4bb6217544c7d8cc2a814d4bb61cd7359165e4af84

  • SHA512

    680adaff375d64c034eba36bd73cbcfc34978fb3fca660e2d6d2d8ab3809f24fb036f747d328c1d95f15b02c68df95b161950820e559b28e27fecb6d5cdbad8e

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SMC INQUIRY.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2668

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2668-115-0x00007FF817560000-0x00007FF817570000-memory.dmp
    Filesize

    64KB

  • memory/2668-116-0x00007FF817560000-0x00007FF817570000-memory.dmp
    Filesize

    64KB

  • memory/2668-117-0x00007FF817560000-0x00007FF817570000-memory.dmp
    Filesize

    64KB

  • memory/2668-118-0x00007FF817560000-0x00007FF817570000-memory.dmp
    Filesize

    64KB

  • memory/2668-119-0x00007FF817560000-0x00007FF817570000-memory.dmp
    Filesize

    64KB

  • memory/2668-120-0x0000018578C20000-0x0000018578C22000-memory.dmp
    Filesize

    8KB

  • memory/2668-121-0x0000018578C20000-0x0000018578C22000-memory.dmp
    Filesize

    8KB

  • memory/2668-122-0x0000018578C20000-0x0000018578C22000-memory.dmp
    Filesize

    8KB