Analysis

  • max time kernel
    152s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:22

General

  • Target

    VDA6.3 2010过程审核(更新)/过程审核缺陷和改进措施表.doc

  • Size

    32KB

  • MD5

    250aba49e20652f0dabbd5bdbe9d1a6b

  • SHA1

    11a8afcf4911ada72e330fd6ddf7375fe9ae452c

  • SHA256

    4097fbd69ec9dbfa7e06510a61039d125dbb6897939b7289040b67a70278218e

  • SHA512

    af25baa12ba8c6d3ae95b55dc2ea9bccbf2ea8411e36ac504507eb78fc51cd03565dbcd77df662b1149d948a110e594df858e8b798ec4ba589022724a2d4b92c

  • SSDEEP

    192:N8+Twv3HUGFu822f5BStZN4liLXum6/6rQk6XHwB+M4mwVi5dk/zl:NFwv3Hzg822f5nciS96XHwBJSViM

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\VDA6.3 2010过程审核(更新)\过程审核缺陷和改进措施表.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1964

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1964-132-0x00007FF9A0410000-0x00007FF9A0420000-memory.dmp
    Filesize

    64KB

  • memory/1964-133-0x00007FF9A0410000-0x00007FF9A0420000-memory.dmp
    Filesize

    64KB

  • memory/1964-134-0x00007FF9A0410000-0x00007FF9A0420000-memory.dmp
    Filesize

    64KB

  • memory/1964-135-0x00007FF9A0410000-0x00007FF9A0420000-memory.dmp
    Filesize

    64KB

  • memory/1964-136-0x00007FF9A0410000-0x00007FF9A0420000-memory.dmp
    Filesize

    64KB

  • memory/1964-137-0x00007FF99E140000-0x00007FF99E150000-memory.dmp
    Filesize

    64KB

  • memory/1964-138-0x00007FF99E140000-0x00007FF99E150000-memory.dmp
    Filesize

    64KB