Analysis

  • max time kernel
    156s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-06-2022 08:27

General

  • Target

    360dituttounpo_document_17.06.2022.docm

  • Size

    1.9MB

  • MD5

    b8552a994bf71f998af07311953eaf75

  • SHA1

    fba9b52887344477bb6af4453a2aeb0d0da9f4f1

  • SHA256

    a35fc4563036807b887e0b4b5f7dcecfeb1608b7b0105604cc762827e68e5d34

  • SHA512

    e83a88de5e924b1bf6d267bb92576479e91df3c7bff0ab1002d4bd9efa6f8b8d7dd2eb0aaba9343e59f5d7d19a27dc9dc1c42027498f35ed569730a2bc84d670

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\360dituttounpo_document_17.06.2022.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2344

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2344-130-0x00007FF89C9D0000-0x00007FF89C9E0000-memory.dmp

    Filesize

    64KB

  • memory/2344-131-0x00007FF89C9D0000-0x00007FF89C9E0000-memory.dmp

    Filesize

    64KB

  • memory/2344-132-0x00007FF89C9D0000-0x00007FF89C9E0000-memory.dmp

    Filesize

    64KB

  • memory/2344-133-0x00007FF89C9D0000-0x00007FF89C9E0000-memory.dmp

    Filesize

    64KB

  • memory/2344-134-0x00007FF89C9D0000-0x00007FF89C9E0000-memory.dmp

    Filesize

    64KB

  • memory/2344-135-0x00007FF89A150000-0x00007FF89A160000-memory.dmp

    Filesize

    64KB

  • memory/2344-136-0x00007FF89A150000-0x00007FF89A160000-memory.dmp

    Filesize

    64KB

  • memory/2344-137-0x000001CDF2C63000-0x000001CDF2E46000-memory.dmp

    Filesize

    1.9MB

  • memory/2344-138-0x000001CDF2880000-0x000001CDF2976000-memory.dmp

    Filesize

    984KB