Resubmissions

11-03-2022 13:36

220311-qwqgdshfa3 4

25-11-2021 16:57

211125-vf983sfhck 10

Analysis

  • max time kernel
    125s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    25-11-2021 16:57

General

  • Target

    Documents – Packing List Commercial Invoice.rtf

  • Size

    18KB

  • MD5

    a5b0056fd2f56303ba063e967644b85f

  • SHA1

    33be2e3727a6e239185edc9deb0134a1a8e3bea1

  • SHA256

    c9d934e0fcb1ab001bc65247caad607d2510f451fc507a7e0773472c70bd15c6

  • SHA512

    dba809471f0bd68da03367c86d30656f85df5624d4d5270d7971b4ce55f3093cfd8551d44ac948600fef8ec9c91a87672989fd8d3b0762cae62a38370e8f463d

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Documents – Packing List Commercial Invoice.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3792

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3792-115-0x00007FFAF61C0000-0x00007FFAF61D0000-memory.dmp
    Filesize

    64KB

  • memory/3792-116-0x00007FFAF61C0000-0x00007FFAF61D0000-memory.dmp
    Filesize

    64KB

  • memory/3792-117-0x00007FFAF61C0000-0x00007FFAF61D0000-memory.dmp
    Filesize

    64KB

  • memory/3792-118-0x00007FFAF61C0000-0x00007FFAF61D0000-memory.dmp
    Filesize

    64KB

  • memory/3792-119-0x00007FFAF61C0000-0x00007FFAF61D0000-memory.dmp
    Filesize

    64KB

  • memory/3792-121-0x000002D0DBA60000-0x000002D0DBA62000-memory.dmp
    Filesize

    8KB

  • memory/3792-120-0x000002D0DBA60000-0x000002D0DBA62000-memory.dmp
    Filesize

    8KB

  • memory/3792-122-0x000002D0DBA60000-0x000002D0DBA62000-memory.dmp
    Filesize

    8KB