Analysis

  • max time kernel
    182s
  • max time network
    185s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-12-2022 09:09

General

  • Target

    NEW ORDER.rtf

  • Size

    28KB

  • MD5

    f6db6f9baf0b962f002500b83d0abc5d

  • SHA1

    b7543cebab50fab48b6d91ba49e62762fc01c917

  • SHA256

    c46900d8ec9729ca6a1e50d4e9fabfa731921b8afd52e63597df73276f28b1a0

  • SHA512

    ced8d0ad572de5b40447c9bd0159445a8682289b832ad2616fa5a6dcde6e7056d48fecea92bde020343d94dddbdab0b3d072fa0f96059280dd9b6ab49654cbc8

  • SSDEEP

    384:GQMmdOFNYY0aaaIswqPeOrka1+fHQJ+t3rQkRhZc6FBMXEOOWRTIUhgncNPf9w5Y:yFx0XaIsnPRIa4fwJMeVTFRTvvG/f6lt

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 62 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\NEW ORDER.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4804-120-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

    Filesize

    64KB

  • memory/4804-121-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

    Filesize

    64KB

  • memory/4804-122-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

    Filesize

    64KB

  • memory/4804-123-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

    Filesize

    64KB

  • memory/4804-126-0x00007FF94CC80000-0x00007FF94CC90000-memory.dmp

    Filesize

    64KB

  • memory/4804-127-0x00007FF94CC80000-0x00007FF94CC90000-memory.dmp

    Filesize

    64KB

  • memory/4804-396-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

    Filesize

    64KB

  • memory/4804-397-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

    Filesize

    64KB

  • memory/4804-398-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

    Filesize

    64KB

  • memory/4804-399-0x00007FF9500F0000-0x00007FF950100000-memory.dmp

    Filesize

    64KB