Analysis

  • max time kernel
    101s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2022, 10:03

General

  • Target

    sample.docx

  • Size

    11KB

  • MD5

    0556c16ed15dcabf91f515bb0ee4ad1a

  • SHA1

    bf5f706c8ae38a34f16fff91d2c3fb2de5c7767a

  • SHA256

    c4cb41c74a89ed9dc6dcc499355227633e99012094baf972d93ca3379ecb2876

  • SHA512

    3debaac6ba824c0a155eae24a3d5e21540a17099076ea231efa2eb11ceb14cc6611630365a7177ec9e36a4dafb78bcffb492567da3fddeb6da4de46776d5ed40

  • SSDEEP

    192:CtNCRf/NfhMc3Pip2DK7auYpYBV1g7M1RUreHR7s1BXFM/:aNgZ3BDK2bYBTCqfFwXFu

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\sample.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4108

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4108-132-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

          Filesize

          64KB

        • memory/4108-134-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

          Filesize

          64KB

        • memory/4108-133-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

          Filesize

          64KB

        • memory/4108-135-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

          Filesize

          64KB

        • memory/4108-136-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

          Filesize

          64KB

        • memory/4108-137-0x00007FFBDA980000-0x00007FFBDA990000-memory.dmp

          Filesize

          64KB

        • memory/4108-138-0x00007FFBDA980000-0x00007FFBDA990000-memory.dmp

          Filesize

          64KB

        • memory/4108-140-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

          Filesize

          64KB

        • memory/4108-141-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

          Filesize

          64KB

        • memory/4108-142-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

          Filesize

          64KB

        • memory/4108-143-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

          Filesize

          64KB