Analysis

  • max time kernel
    102s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-03-2023 16:16

General

  • Target

    5458353974866046490330130384.doc

  • Size

    215KB

  • MD5

    eb955ede0aec078ab68cfa3961d7c51f

  • SHA1

    2be16fceb95d47fb068f336da92f51a70342be2e

  • SHA256

    46565a6680f1109b7e2992372ce32198250848f8a76272400a00741072982787

  • SHA512

    88c60ed3bec8486b048a71fb1e803a64a390fe2c35b859f06aa5ac21d28c9514d59bc14da45a89579edae9e5a968ba1c92f1c2e5582fbcb1d3001a62bec78e82

  • SSDEEP

    3072:rtDUowQvvcXbKWVLarYTEDNxNQ5uBBzwFWIVMRcQDNu9spD3qWjx9:ryorvEm+LaMTEfe5Awrw4WN9

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5458353974866046490330130384.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:688

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/688-133-0x00007FF843670000-0x00007FF843680000-memory.dmp
    Filesize

    64KB

  • memory/688-134-0x00007FF843670000-0x00007FF843680000-memory.dmp
    Filesize

    64KB

  • memory/688-135-0x00007FF843670000-0x00007FF843680000-memory.dmp
    Filesize

    64KB

  • memory/688-136-0x00007FF843670000-0x00007FF843680000-memory.dmp
    Filesize

    64KB

  • memory/688-137-0x00007FF843670000-0x00007FF843680000-memory.dmp
    Filesize

    64KB

  • memory/688-138-0x00007FF840EE0000-0x00007FF840EF0000-memory.dmp
    Filesize

    64KB

  • memory/688-139-0x00007FF840EE0000-0x00007FF840EF0000-memory.dmp
    Filesize

    64KB

  • memory/688-177-0x00007FF843670000-0x00007FF843680000-memory.dmp
    Filesize

    64KB

  • memory/688-176-0x00007FF843670000-0x00007FF843680000-memory.dmp
    Filesize

    64KB

  • memory/688-175-0x00007FF843670000-0x00007FF843680000-memory.dmp
    Filesize

    64KB

  • memory/688-174-0x00007FF843670000-0x00007FF843680000-memory.dmp
    Filesize

    64KB