Analysis

  • max time kernel
    205s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 13:58

General

  • Target

    2ab1ca0dc689e4923780d7b33274a15f529a4f32a56ddd0b8b5edcd25f71d6aa.doc

  • Size

    100KB

  • MD5

    5332700431809cc8f4c916dfb16194bc

  • SHA1

    3320d535a142d53440747ed07f75cb3b2a57faac

  • SHA256

    2ab1ca0dc689e4923780d7b33274a15f529a4f32a56ddd0b8b5edcd25f71d6aa

  • SHA512

    17297e59c6f0a18f404008f63c3c3fa26d8e84eaffe4ddacc9996c27441445579beb772a1112171ecdb7f022c66fda07360a67b6caa816d83fea438557afc88f

  • SSDEEP

    768:zEzhOxrPqQOo+erN7I/Cs2diu1j8UNDu1:zEzuPqbo+erN7IUdtjhA

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2ab1ca0dc689e4923780d7b33274a15f529a4f32a56ddd0b8b5edcd25f71d6aa.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/240-132-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/240-133-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/240-134-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/240-135-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/240-136-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/240-137-0x00007FF80BFF0000-0x00007FF80C000000-memory.dmp
    Filesize

    64KB

  • memory/240-138-0x00007FF80BFF0000-0x00007FF80C000000-memory.dmp
    Filesize

    64KB