Analysis

  • max time kernel
    113s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2023 09:57

General

  • Target

    Order.rtf

  • Size

    26KB

  • MD5

    d7b4ead6fc37ef7315c0118f8039e5fd

  • SHA1

    70c4b99344efebdfd15c84543a73387e051d9c6e

  • SHA256

    390638174e786d6f8debc631dcd06acf8e06fe5a80f9dbb6cad409794bf70ff0

  • SHA512

    398e8627329f6cd74279e6b2c8f07aec58a522804b8177523c6a8ee259710067de2d8bd4d9f166122dd748727bb5938c4af7c43176aa2b133e9617edd80dc255

  • SSDEEP

    384:qQMmdOFNYY0aaaIswqPeOrka1+fHQJ+t3rQkRhZgNAStY8hAtGMHM62bIhRohX9s:mFx0XaIsnPRIa4fwJMn8CtGP62E29s

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Order.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4896

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4896-132-0x00007FF7EE0B0000-0x00007FF7EE0C0000-memory.dmp
    Filesize

    64KB

  • memory/4896-133-0x00007FF7EE0B0000-0x00007FF7EE0C0000-memory.dmp
    Filesize

    64KB

  • memory/4896-134-0x00007FF7EE0B0000-0x00007FF7EE0C0000-memory.dmp
    Filesize

    64KB

  • memory/4896-135-0x00007FF7EE0B0000-0x00007FF7EE0C0000-memory.dmp
    Filesize

    64KB

  • memory/4896-136-0x00007FF7EE0B0000-0x00007FF7EE0C0000-memory.dmp
    Filesize

    64KB

  • memory/4896-137-0x00007FF7EBF50000-0x00007FF7EBF60000-memory.dmp
    Filesize

    64KB

  • memory/4896-138-0x00007FF7EBF50000-0x00007FF7EBF60000-memory.dmp
    Filesize

    64KB

  • memory/4896-140-0x00007FF7EE0B0000-0x00007FF7EE0C0000-memory.dmp
    Filesize

    64KB

  • memory/4896-141-0x00007FF7EE0B0000-0x00007FF7EE0C0000-memory.dmp
    Filesize

    64KB

  • memory/4896-142-0x00007FF7EE0B0000-0x00007FF7EE0C0000-memory.dmp
    Filesize

    64KB

  • memory/4896-143-0x00007FF7EE0B0000-0x00007FF7EE0C0000-memory.dmp
    Filesize

    64KB