Analysis

  • max time kernel
    177s
  • max time network
    236s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 14:03

General

  • Target

    K1-3K2-2ؿбļ/02.ļ/01./4.�.doc

  • Size

    50KB

  • MD5

    559cabd43fffaa6bc5d79255f5c39305

  • SHA1

    1140b177e0be1056683693cff99adbce4259c7df

  • SHA256

    50cdcec245e9d5b81c9d7e3e19bebf2f39a1c9feb6f7fc3c06817a67738f14a2

  • SHA512

    f3be53392c0073863abfd0bf3155392aa7cd80b00634259cd76a2c5ab444ef9fd3f105f26547f54b5fec5eb32762110ab40d44265a2f242ce36aa32996fb4ac7

  • SSDEEP

    768:9Q7ytpBLX5fL7BBMPHRGcuHIIPiwphZT3dfm2nqDXiX8qyAPogmTt:9LiwhTtfrnE4EAPogmTt

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\K1-3K2-2ؿбļ\02.ļ\01.\4.�.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1552

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1552-132-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/1552-133-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/1552-134-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/1552-135-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/1552-136-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/1552-137-0x00007FF80BFF0000-0x00007FF80C000000-memory.dmp
    Filesize

    64KB

  • memory/1552-138-0x00007FF80BFF0000-0x00007FF80C000000-memory.dmp
    Filesize

    64KB

  • memory/1552-140-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/1552-141-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/1552-142-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB

  • memory/1552-143-0x00007FF80E710000-0x00007FF80E720000-memory.dmp
    Filesize

    64KB