Analysis

  • max time kernel
    174s
  • max time network
    212s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-03-2023 23:44

General

  • Target

    SecuriteInfo.com.W97M.Invkay.24548.doc

  • Size

    102KB

  • MD5

    f301152b766bffb129f8fb73aa15485c

  • SHA1

    358b972cc9b9fadf48d1c2f1a9b7e0acccf91e79

  • SHA256

    71601ec9b02db66d9c0068b127e3516fec8abde0a13d0be2422f5d6baa58d897

  • SHA512

    3cb38bef4adfc475a47e568c9c7a7a58ada8150ae787412cbe783ae7040c4e0d5739932fb13eb7c2cbc500aa16eb7acd4f06c4521ea49bda75b12344b1323185

  • SSDEEP

    768:RgcFMo2zRrfCHuY26gfa3Z5quiV5mI0rAAF852m5bSRfblz3JShT5FcHuurEGES6:RgcFMVz9fcuMtzWNzurIt+NDt

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W97M.Invkay.24548.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3740

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3740-133-0x00007FFC7C930000-0x00007FFC7C940000-memory.dmp
    Filesize

    64KB

  • memory/3740-134-0x00007FFC7C930000-0x00007FFC7C940000-memory.dmp
    Filesize

    64KB

  • memory/3740-135-0x00007FFC7C930000-0x00007FFC7C940000-memory.dmp
    Filesize

    64KB

  • memory/3740-136-0x00007FFC7C930000-0x00007FFC7C940000-memory.dmp
    Filesize

    64KB

  • memory/3740-137-0x00007FFC7C930000-0x00007FFC7C940000-memory.dmp
    Filesize

    64KB

  • memory/3740-138-0x00007FFC79FD0000-0x00007FFC79FE0000-memory.dmp
    Filesize

    64KB

  • memory/3740-139-0x00007FFC79FD0000-0x00007FFC79FE0000-memory.dmp
    Filesize

    64KB