Analysis

  • max time kernel
    180s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 16:36

General

  • Target

    SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.15559.24662.rtf

  • Size

    33KB

  • MD5

    b37b91e94861e4515bf3d78328f73ba5

  • SHA1

    688fb6633a4c08529231e69d5e7ec331f5bbbddd

  • SHA256

    6a5116dae3e3873885e1a98b06af60d65ff2da2e7971eedcff92ab965b7f74a0

  • SHA512

    eb01c892c4f17936818ec7017e195368a032740e447cd1417d39707bc9e06b2b8e0afc38b099363fa477685fbfb426f546539f9c322c27131dc066a83c2a2fa2

  • SSDEEP

    768:nFx0XaIsnPRIa4fwJMBq9atgaqkvoLCMN5rHBMNBy1x3:nf0Xvx3EMEkyaqsaCMb+By1x3

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.15559.24662.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4508-133-0x00007FFA58010000-0x00007FFA58020000-memory.dmp
    Filesize

    64KB

  • memory/4508-135-0x00007FFA58010000-0x00007FFA58020000-memory.dmp
    Filesize

    64KB

  • memory/4508-134-0x00007FFA58010000-0x00007FFA58020000-memory.dmp
    Filesize

    64KB

  • memory/4508-136-0x00007FFA58010000-0x00007FFA58020000-memory.dmp
    Filesize

    64KB

  • memory/4508-137-0x00007FFA58010000-0x00007FFA58020000-memory.dmp
    Filesize

    64KB

  • memory/4508-138-0x00007FFA55FB0000-0x00007FFA55FC0000-memory.dmp
    Filesize

    64KB

  • memory/4508-139-0x00007FFA55FB0000-0x00007FFA55FC0000-memory.dmp
    Filesize

    64KB

  • memory/4508-141-0x00007FFA58010000-0x00007FFA58020000-memory.dmp
    Filesize

    64KB

  • memory/4508-142-0x00007FFA58010000-0x00007FFA58020000-memory.dmp
    Filesize

    64KB

  • memory/4508-143-0x00007FFA58010000-0x00007FFA58020000-memory.dmp
    Filesize

    64KB

  • memory/4508-144-0x00007FFA58010000-0x00007FFA58020000-memory.dmp
    Filesize

    64KB