Analysis

  • max time kernel
    147s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220331-en
  • submitted
    11-04-2022 12:16

General

  • Target

    =?iso-8859-9?Q?Minutes_of_Meeting-Toplant=FD_Tutana=F0=FD-(Eng)-31.03.22.docx

  • Size

    29KB

  • MD5

    53255286f68b46ec88d1114971f39336

  • SHA1

    7bcb3e0440b8a298cda989dbd12794ff4c7968ab

  • SHA256

    65076ea9c7be899fb71bab55c28e16add2aeee619b01ac97b316895fdafaf12d

  • SHA512

    cf84056c6e7e9b5f9b17fdac90bfd539a78fe7d530c31df41e017f4a6ef6d2ffd450e17e31e8b11a7c65517eec59525a5c6b7d4a91d8a3a30095cda477f0706f

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\=_iso-8859-9_Q_Minutes_of_Meeting-Toplant=FD_Tutana=F0=FD-(Eng)-31.03.22.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1784-124-0x00007FFEB7CB0000-0x00007FFEB7CC0000-memory.dmp
    Filesize

    64KB

  • memory/1784-125-0x00007FFEB7CB0000-0x00007FFEB7CC0000-memory.dmp
    Filesize

    64KB

  • memory/1784-126-0x00007FFEB7CB0000-0x00007FFEB7CC0000-memory.dmp
    Filesize

    64KB

  • memory/1784-127-0x00007FFEB7CB0000-0x00007FFEB7CC0000-memory.dmp
    Filesize

    64KB

  • memory/1784-128-0x00007FFEB7CB0000-0x00007FFEB7CC0000-memory.dmp
    Filesize

    64KB

  • memory/1784-129-0x00007FFEB7CB0000-0x00007FFEB7CC0000-memory.dmp
    Filesize

    64KB

  • memory/1784-130-0x00007FFEB7CB0000-0x00007FFEB7CC0000-memory.dmp
    Filesize

    64KB

  • memory/1784-131-0x00007FFEB7CB0000-0x00007FFEB7CC0000-memory.dmp
    Filesize

    64KB

  • memory/1784-132-0x00007FFEB7CB0000-0x00007FFEB7CC0000-memory.dmp
    Filesize

    64KB