Analysis

  • max time kernel
    292s
  • max time network
    278s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2022, 17:12

General

  • Target

    ecc4849687b91dc656c8b8989e72db4544917f42ae00c1d3ece2c0caffb4ae8d.docx

  • Size

    23KB

  • MD5

    12972841001bf28f6f1d8324ed16625a

  • SHA1

    7761c96c911a7dbab2bec2358464d872241fc441

  • SHA256

    ecc4849687b91dc656c8b8989e72db4544917f42ae00c1d3ece2c0caffb4ae8d

  • SHA512

    fc28cd72976e2d98f01717914ecb8edf052da08e7845bf6d3d300403fe7f1fea95a1f02d8188d881113f20385ab3a218b361c3d37024788415d6ddb638d6ecae

  • SSDEEP

    384:d0hxI9Nn3N4ZI1NL09j+E+KjFmweCoDFiuccvpegZvjSKseZWehxq8:d0hCfnH1NL0YExRqRiuDv5j7seZzxL

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ecc4849687b91dc656c8b8989e72db4544917f42ae00c1d3ece2c0caffb4ae8d.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4388

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3836-132-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp

            Filesize

            64KB

          • memory/3836-133-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp

            Filesize

            64KB

          • memory/3836-134-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp

            Filesize

            64KB

          • memory/3836-135-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp

            Filesize

            64KB

          • memory/3836-136-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp

            Filesize

            64KB

          • memory/3836-137-0x00007FF8F9330000-0x00007FF8F9340000-memory.dmp

            Filesize

            64KB

          • memory/3836-138-0x00007FF8F9330000-0x00007FF8F9340000-memory.dmp

            Filesize

            64KB