Analysis

  • max time kernel
    104s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 07:52

General

  • Target

    b8bb0eb40df72fad412c799e4d13e3326fd45325cf1715a378d62ad73b0ddf3e.doc

  • Size

    23KB

  • MD5

    d71781b4ea649c2a1ba6e95523f3a344

  • SHA1

    28560b9ce9768c0d26b90e1e3110372a7e0937a4

  • SHA256

    b8bb0eb40df72fad412c799e4d13e3326fd45325cf1715a378d62ad73b0ddf3e

  • SHA512

    56dd17c10a2504e9a101ebdb396c94b41ab90bbef2c87f35044e557fa5ab624e539487d1f433dda8b70d6dc577eef961b5879946dba289de331707169e5d4eb4

  • SSDEEP

    192:FBbe1Xhzt/68EaYg9yJ5wchP5z7zYqa2SX+iwVU6ouE066robTG:fUHzch9zYqa3Oi4UU

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b8bb0eb40df72fad412c799e4d13e3326fd45325cf1715a378d62ad73b0ddf3e.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2776-132-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

    Filesize

    64KB

  • memory/2776-133-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

    Filesize

    64KB

  • memory/2776-134-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

    Filesize

    64KB

  • memory/2776-135-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

    Filesize

    64KB

  • memory/2776-136-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

    Filesize

    64KB

  • memory/2776-137-0x00007FFB61FD0000-0x00007FFB61FE0000-memory.dmp

    Filesize

    64KB

  • memory/2776-138-0x00007FFB61FD0000-0x00007FFB61FE0000-memory.dmp

    Filesize

    64KB

  • memory/2776-140-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

    Filesize

    64KB

  • memory/2776-141-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

    Filesize

    64KB

  • memory/2776-142-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

    Filesize

    64KB

  • memory/2776-143-0x00007FFB64030000-0x00007FFB64040000-memory.dmp

    Filesize

    64KB