Analysis

  • max time kernel
    152s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 01:20

General

  • Target

    8534218ca24cdc9b80b7e4e855a2057a91507659181ecf3b68116149121525ca.doc

  • Size

    36KB

  • MD5

    648ef9f214abb2d02425363870cea441

  • SHA1

    3fcb7df96aae28364ea053e7e22431f816b4e31a

  • SHA256

    8534218ca24cdc9b80b7e4e855a2057a91507659181ecf3b68116149121525ca

  • SHA512

    376ae0e818a19e7233bca4d8eaeccc6ac44a37fb3d7b54e9cc557fea629ae87dd916995cdc341da546bad704115b15f6a15002906c0129c7d9654502413c0709

  • SSDEEP

    384:n7eOz+2viSeav9LyGmX6//GlGFtkIsn4YMdgeX0jowk:nqOz1f9LTmY/GlWbT

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8534218ca24cdc9b80b7e4e855a2057a91507659181ecf3b68116149121525ca.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2548

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2548-132-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp
    Filesize

    64KB

  • memory/2548-133-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp
    Filesize

    64KB

  • memory/2548-134-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp
    Filesize

    64KB

  • memory/2548-135-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp
    Filesize

    64KB

  • memory/2548-136-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp
    Filesize

    64KB

  • memory/2548-137-0x00007FF8F9330000-0x00007FF8F9340000-memory.dmp
    Filesize

    64KB

  • memory/2548-138-0x00007FF8F9330000-0x00007FF8F9340000-memory.dmp
    Filesize

    64KB

  • memory/2548-242-0x0000017857439000-0x000001785743B000-memory.dmp
    Filesize

    8KB

  • memory/2548-243-0x0000017857439000-0x000001785743B000-memory.dmp
    Filesize

    8KB

  • memory/2548-244-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp
    Filesize

    64KB

  • memory/2548-245-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp
    Filesize

    64KB

  • memory/2548-246-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp
    Filesize

    64KB

  • memory/2548-247-0x00007FF8FBB30000-0x00007FF8FBB40000-memory.dmp
    Filesize

    64KB