Analysis

  • max time kernel
    129s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-03-2023 22:47

General

  • Target

    99bcda0fd0998fae1b485f9e4a458c534aaca5fcc5b5c389f5112a90386a3307.doc

  • Size

    521.3MB

  • MD5

    f166769bbdcdc4e956d4693a28207de9

  • SHA1

    58e9069253b60003c6ac1146dee44d163bbf6d6d

  • SHA256

    99bcda0fd0998fae1b485f9e4a458c534aaca5fcc5b5c389f5112a90386a3307

  • SHA512

    e7e71f4312f163ce81f0e89b631bd2985963d9c314fa6a45022c4b3635054de62156be692ad9aa7ec3e1ce4c942a569f9884294623cd0b2928dde05c793062dd

  • SSDEEP

    6144:QDuxuMOZCBtANveapnaWVgsaNlbfXhoEHC87pnkTnlzIWZ4:18yGZZak8fxJB1e5IWZ4

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Script User-Agent 7 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\99bcda0fd0998fae1b485f9e4a458c534aaca5fcc5b5c389f5112a90386a3307.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4480

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/4480-116-0x00007FF970260000-0x00007FF970270000-memory.dmp

    Filesize

    64KB

  • memory/4480-117-0x00007FF970260000-0x00007FF970270000-memory.dmp

    Filesize

    64KB

  • memory/4480-118-0x00007FF970260000-0x00007FF970270000-memory.dmp

    Filesize

    64KB

  • memory/4480-119-0x00007FF970260000-0x00007FF970270000-memory.dmp

    Filesize

    64KB

  • memory/4480-122-0x00007FF96CCA0000-0x00007FF96CCB0000-memory.dmp

    Filesize

    64KB

  • memory/4480-123-0x00007FF96CCA0000-0x00007FF96CCB0000-memory.dmp

    Filesize

    64KB

  • memory/4480-381-0x00007FF970260000-0x00007FF970270000-memory.dmp

    Filesize

    64KB

  • memory/4480-382-0x00007FF970260000-0x00007FF970270000-memory.dmp

    Filesize

    64KB

  • memory/4480-383-0x00007FF970260000-0x00007FF970270000-memory.dmp

    Filesize

    64KB

  • memory/4480-384-0x00007FF970260000-0x00007FF970270000-memory.dmp

    Filesize

    64KB