Analysis

  • max time kernel
    183s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 16:47

General

  • Target

    c843aef07b285a423c504c3229af7acac8150159a6794d9c4f012688fc3926a2.doc

  • Size

    37KB

  • MD5

    e32633b2e0da8bd2c5d209277029f6b8

  • SHA1

    1f59cf0dc44f0e29643c87c5af726d942e4669dc

  • SHA256

    c843aef07b285a423c504c3229af7acac8150159a6794d9c4f012688fc3926a2

  • SHA512

    bfe44b9341de9ae128a55eff5415585101e33a4ec613d5dead81546fc1741796b0136f5a1b747e8e7980b61b8dbdd40ef4463610f86b70ddca08cc74e920732b

  • SSDEEP

    384:0CGbiSdJ7U/vNCRDvX0j6OtUBMDybA5hlDQEjGl6r:0nJg9MfyycfFjGl6

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c843aef07b285a423c504c3229af7acac8150159a6794d9c4f012688fc3926a2.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1568

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1568-132-0x00007FF875710000-0x00007FF875720000-memory.dmp
    Filesize

    64KB

  • memory/1568-134-0x00007FF875710000-0x00007FF875720000-memory.dmp
    Filesize

    64KB

  • memory/1568-133-0x00007FF875710000-0x00007FF875720000-memory.dmp
    Filesize

    64KB

  • memory/1568-135-0x00007FF875710000-0x00007FF875720000-memory.dmp
    Filesize

    64KB

  • memory/1568-136-0x00007FF875710000-0x00007FF875720000-memory.dmp
    Filesize

    64KB

  • memory/1568-137-0x00007FF873230000-0x00007FF873240000-memory.dmp
    Filesize

    64KB

  • memory/1568-138-0x00007FF873230000-0x00007FF873240000-memory.dmp
    Filesize

    64KB