Analysis
-
max time kernel
101s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 22:46
Behavioral task
behavioral1
Sample
s3-sa-east-1.amazonaws.com_tcm-assets_fraport-fortaleza-ptbr_files_assignees_credenciamento_formul_c.docm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
s3-sa-east-1.amazonaws.com_tcm-assets_fraport-fortaleza-ptbr_files_assignees_credenciamento_formul_c.docm
Resource
win10v2004-20230220-en
General
-
Target
s3-sa-east-1.amazonaws.com_tcm-assets_fraport-fortaleza-ptbr_files_assignees_credenciamento_formul_c.docm
-
Size
68KB
-
MD5
5e7658785aff7fdae8eb078c9e50e453
-
SHA1
d181b06c45d19430ad482244edd8892b16bfc381
-
SHA256
6b11c7e042bf65c285ab4cad923935d6c0a08a42ff48744c370fc444cce7a7cd
-
SHA512
8508ea831c75a88d2a215aa0fc863fa317eee1674b6e16f131fe37f43c0cb422ba3568b897531164c33628b14ccc9ebf7bcd9a0361673e521162cddec22a6125
-
SSDEEP
1536:lOyTHB3cmHJPM2auV2/DTdzqbbNNQQ/RDa9:k4pMm2m1ndM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1384 WINWORD.EXE 1384 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
WINWORD.EXEpid process 1384 WINWORD.EXE 1384 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
WINWORD.EXEpid process 1384 WINWORD.EXE 1384 WINWORD.EXE 1384 WINWORD.EXE 1384 WINWORD.EXE 1384 WINWORD.EXE 1384 WINWORD.EXE 1384 WINWORD.EXE 1384 WINWORD.EXE 1384 WINWORD.EXE 1384 WINWORD.EXE 1384 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 1384 wrote to memory of 216 1384 WINWORD.EXE splwow64.exe PID 1384 wrote to memory of 216 1384 WINWORD.EXE splwow64.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\s3-sa-east-1.amazonaws.com_tcm-assets_fraport-fortaleza-ptbr_files_assignees_credenciamento_formul_c.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642B
MD54cfa5bc2c44c4ed09e6b0cfd16753ab7
SHA1d30c27726689dd6a3dccdce5f35e2ceccf2cc029
SHA25687fd96b3e4276772b1c026b116bfab1ab621a0717a4b696b3034b2031a0644dc
SHA512edf1723cae62f933216b17bed4a93403700ba85eeb2eefe786d6192d3cdcf3bfe82d70951bfab3bbf1b1a9e91e2e368041953ac2e826df16a46c0e84926a48c3
-
Filesize
642B
MD54f03b86e4d6631c26ff5fffc7332be1d
SHA114952a78ea51df67d5b5b6c6b4de3d96ba7935bd
SHA25683f4ea26254d69825486bffd1d400217aac7245c5c48fe5acc3ccdea173c4851
SHA5124bed29b66444d826e89589b55dd786758ff68fcd2daf8296703d4443edb991fffce563e20db22bfb34fdb488638bbb43252392b6c105d12e721329adc2774632