Analysis

  • max time kernel
    1640s
  • max time network
    1423s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    17-03-2022 12:10

General

  • Target

    commercial qualification statement.docx

  • Size

    19KB

  • MD5

    2a69868207d288236cb256cabf29d961

  • SHA1

    71bf0f03834d20525f300cbc0d1648e4e59e952c

  • SHA256

    891d2d88efbf303ede86ae7d82a22b783aa7f271d8027bf9dd986a9bebe07cf3

  • SHA512

    7ac0ba9ab72b79426bb0b37d6169c98cb48d0260179b8232260e00e0325078a9af9ec14d11474374232841cf206155a90ef8467ade0e017c06645b5bc79ac694

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\commercial qualification statement.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1708

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1708-130-0x00007FFA7DBF0000-0x00007FFA7DC00000-memory.dmp
    Filesize

    64KB

  • memory/1708-131-0x00007FFA7DBF0000-0x00007FFA7DC00000-memory.dmp
    Filesize

    64KB

  • memory/1708-132-0x00007FFA7DBF0000-0x00007FFA7DC00000-memory.dmp
    Filesize

    64KB

  • memory/1708-133-0x00007FFA7DBF0000-0x00007FFA7DC00000-memory.dmp
    Filesize

    64KB

  • memory/1708-134-0x00007FFA7DBF0000-0x00007FFA7DC00000-memory.dmp
    Filesize

    64KB

  • memory/1708-135-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-137-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-136-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-138-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-139-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-140-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-141-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-142-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-143-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-144-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-145-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-146-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-147-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-148-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-149-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-150-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-151-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB

  • memory/1708-153-0x00007FFA7DBF0000-0x00007FFA7DC00000-memory.dmp
    Filesize

    64KB

  • memory/1708-152-0x00007FFA7DBF0000-0x00007FFA7DC00000-memory.dmp
    Filesize

    64KB

  • memory/1708-154-0x00007FFA7DBF0000-0x00007FFA7DC00000-memory.dmp
    Filesize

    64KB

  • memory/1708-155-0x00007FFA7DBF0000-0x00007FFA7DC00000-memory.dmp
    Filesize

    64KB

  • memory/1708-156-0x00007FFABDB70000-0x00007FFABDD65000-memory.dmp
    Filesize

    2.0MB