Analysis

  • max time kernel
    151s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:39

General

  • Target

    3d53b54d98e14f9de2a2316fe09ee6b9fe27f2dacdd4ad85f52dd1e16eebb006.doc

  • Size

    367KB

  • MD5

    7ad977e490ead6a113d88aa8091d3dfd

  • SHA1

    f5f3c7a449bc658dee88153fbc6cf21061eaa1df

  • SHA256

    3d53b54d98e14f9de2a2316fe09ee6b9fe27f2dacdd4ad85f52dd1e16eebb006

  • SHA512

    84de4a09c3533f94bf76bbaaf47ee67f5b1da809a40140d570ff7000f912e2f6217dc55f1c42895870c26682c7c4ca52803b5fc802fb039755563d3d20377b5c

  • SSDEEP

    6144:CEnfyZlEDVXmnIW2iDKPbIz7yStMvWqDJv7yC3dLPm+UidwOydGWm0CFJ:CEnfyAonINPbwCHDNeCk+UiWOyZwJ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3d53b54d98e14f9de2a2316fe09ee6b9fe27f2dacdd4ad85f52dd1e16eebb006.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3204-132-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

    Filesize

    64KB

  • memory/3204-133-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

    Filesize

    64KB

  • memory/3204-134-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

    Filesize

    64KB

  • memory/3204-135-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

    Filesize

    64KB

  • memory/3204-136-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

    Filesize

    64KB

  • memory/3204-137-0x00007FFBDA980000-0x00007FFBDA990000-memory.dmp

    Filesize

    64KB

  • memory/3204-138-0x00007FFBDA980000-0x00007FFBDA990000-memory.dmp

    Filesize

    64KB

  • memory/3204-139-0x000001D9318B0000-0x000001D9318B4000-memory.dmp

    Filesize

    16KB

  • memory/3204-143-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

    Filesize

    64KB

  • memory/3204-144-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

    Filesize

    64KB

  • memory/3204-145-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

    Filesize

    64KB

  • memory/3204-146-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

    Filesize

    64KB