Analysis

  • max time kernel
    117s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    07-12-2021 11:27

General

  • Target

    statement.doc

  • Size

    15KB

  • MD5

    e6f108d6d7cf1d0e0c4fd34c5bc1f42e

  • SHA1

    938c44cedd8b1a15f69448a5c4c7790a3bff8426

  • SHA256

    ce6e03397d462d0a91e4a87e343c1b85d1578e4d1ca492c183f3d1b38e8bf9b2

  • SHA512

    b17b52e8ba0c4f9f9d1d23693ba8d9e22dbfee21c0ef0285b2fe8c3432cb3aaeb21600da1fdbca87fb092ac829f2a14e2c77985a6032a48963b730811e0c313c

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\statement.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2864

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2864-115-0x00007FFAE6A50000-0x00007FFAE6A60000-memory.dmp
    Filesize

    64KB

  • memory/2864-116-0x00007FFAE6A50000-0x00007FFAE6A60000-memory.dmp
    Filesize

    64KB

  • memory/2864-117-0x00007FFAE6A50000-0x00007FFAE6A60000-memory.dmp
    Filesize

    64KB

  • memory/2864-118-0x00007FFAE6A50000-0x00007FFAE6A60000-memory.dmp
    Filesize

    64KB

  • memory/2864-119-0x00007FFAE6A50000-0x00007FFAE6A60000-memory.dmp
    Filesize

    64KB

  • memory/2864-120-0x0000021F40DA0000-0x0000021F40DA2000-memory.dmp
    Filesize

    8KB

  • memory/2864-121-0x0000021F40DA0000-0x0000021F40DA2000-memory.dmp
    Filesize

    8KB

  • memory/2864-122-0x0000021F40DA0000-0x0000021F40DA2000-memory.dmp
    Filesize

    8KB