Analysis

  • max time kernel
    143s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-03-2023 04:21

General

  • Target

    e65c722b00600584d7d4b3d076677fe3.rtf

  • Size

    13KB

  • MD5

    e65c722b00600584d7d4b3d076677fe3

  • SHA1

    852f00f649d43f8df47d730a57ec07db9ce29a4d

  • SHA256

    093aed8321e0c99537fde1bd8c9cd7e2bfef3fdcde9ddd5122f4d63665a9e602

  • SHA512

    8fc290a555916e6da21b8611f15a31d47c7db5146d0fad302cb0cd520f8391b4be13cc3e60cda94b0810a679d34725be04386230b5f78723393df6d65371d0a4

  • SSDEEP

    384:/TzQ7OauCOpdDuH+dmq3cP/HbjHcoKM3fyG6ZS9v:rz0OrCOpg+Mq3c3HtKVZS9v

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e65c722b00600584d7d4b3d076677fe3.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2756-133-0x00007FFF742D0000-0x00007FFF742E0000-memory.dmp

    Filesize

    64KB

  • memory/2756-134-0x00007FFF742D0000-0x00007FFF742E0000-memory.dmp

    Filesize

    64KB

  • memory/2756-135-0x00007FFF742D0000-0x00007FFF742E0000-memory.dmp

    Filesize

    64KB

  • memory/2756-136-0x00007FFF742D0000-0x00007FFF742E0000-memory.dmp

    Filesize

    64KB

  • memory/2756-137-0x00007FFF742D0000-0x00007FFF742E0000-memory.dmp

    Filesize

    64KB

  • memory/2756-138-0x00007FFF719F0000-0x00007FFF71A00000-memory.dmp

    Filesize

    64KB

  • memory/2756-139-0x00007FFF719F0000-0x00007FFF71A00000-memory.dmp

    Filesize

    64KB

  • memory/2756-169-0x00007FFF742D0000-0x00007FFF742E0000-memory.dmp

    Filesize

    64KB

  • memory/2756-168-0x00007FFF742D0000-0x00007FFF742E0000-memory.dmp

    Filesize

    64KB

  • memory/2756-170-0x00007FFF742D0000-0x00007FFF742E0000-memory.dmp

    Filesize

    64KB

  • memory/2756-171-0x00007FFF742D0000-0x00007FFF742E0000-memory.dmp

    Filesize

    64KB