Analysis

  • max time kernel
    103s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2022, 16:04

General

  • Target

    5334206550235/5334206550235.doc

  • Size

    13B

  • MD5

    3e8b2bca43b13d7da07d14c6852d43d9

  • SHA1

    6f11c80c2015efb519cc4f5d8b066feaddd2ceaf

  • SHA256

    35a2b9e0e3629c9a4acee07fa39f850268b291f552f1bfd1fec68772d32d17fc

  • SHA512

    1a26f6778ec7bab26bb833bd538dda8d38cd93ce2d7908ec929896fe0d573a25f0aae38de4c5aab2edc7e74cb6ec9ea18a067e4109adf8ef53fe23573b10793e

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5334206550235\5334206550235.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4980-135-0x00007FFCCDEB0000-0x00007FFCCDEC0000-memory.dmp

    Filesize

    64KB

  • memory/4980-136-0x00007FFCCDEB0000-0x00007FFCCDEC0000-memory.dmp

    Filesize

    64KB

  • memory/4980-137-0x00007FFCCDEB0000-0x00007FFCCDEC0000-memory.dmp

    Filesize

    64KB

  • memory/4980-138-0x00007FFCCDEB0000-0x00007FFCCDEC0000-memory.dmp

    Filesize

    64KB

  • memory/4980-139-0x00007FFCCDEB0000-0x00007FFCCDEC0000-memory.dmp

    Filesize

    64KB

  • memory/4980-140-0x00007FFCCB810000-0x00007FFCCB820000-memory.dmp

    Filesize

    64KB

  • memory/4980-141-0x00007FFCCB810000-0x00007FFCCB820000-memory.dmp

    Filesize

    64KB

  • memory/4980-143-0x00007FFCCDEB0000-0x00007FFCCDEC0000-memory.dmp

    Filesize

    64KB

  • memory/4980-145-0x00007FFCCDEB0000-0x00007FFCCDEC0000-memory.dmp

    Filesize

    64KB

  • memory/4980-146-0x00007FFCCDEB0000-0x00007FFCCDEC0000-memory.dmp

    Filesize

    64KB

  • memory/4980-144-0x00007FFCCDEB0000-0x00007FFCCDEC0000-memory.dmp

    Filesize

    64KB