Analysis

  • max time kernel
    114s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2023, 11:45

General

  • Target

    invoice_107_2023.rtf

  • Size

    5KB

  • MD5

    8a40bb6b14682736fe06bd11fb985f26

  • SHA1

    44e58314a51239eeabd15870c142e7ae7179e011

  • SHA256

    3e8138c2e3df4bf31ffd49d89f64916a72c02c612cd080cdec44fdafcae42854

  • SHA512

    d9f6504170a1db91389056bffe6fdabdf366ae0cc7afe819f2a203e3b2c96c4874181b5d34a8778e82d170c190924305291f0e50324a120e5592f38a0e17ef5b

  • SSDEEP

    96:k/lUQKr4IyQRlnbrMmimYUQl+Xa4SW0KImPdwKNKmnpErpjkUW2qr2rg6UCmKR/X:2KQKZvnbg46+K4VOyjKYcd8r/6U6XH

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\invoice_107_2023.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4272

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4272-133-0x00007FF90E8D0000-0x00007FF90E8E0000-memory.dmp

          Filesize

          64KB

        • memory/4272-135-0x00007FF90E8D0000-0x00007FF90E8E0000-memory.dmp

          Filesize

          64KB

        • memory/4272-134-0x00007FF90E8D0000-0x00007FF90E8E0000-memory.dmp

          Filesize

          64KB

        • memory/4272-136-0x00007FF90E8D0000-0x00007FF90E8E0000-memory.dmp

          Filesize

          64KB

        • memory/4272-137-0x00007FF90E8D0000-0x00007FF90E8E0000-memory.dmp

          Filesize

          64KB

        • memory/4272-138-0x00007FF90C150000-0x00007FF90C160000-memory.dmp

          Filesize

          64KB

        • memory/4272-139-0x00007FF90C150000-0x00007FF90C160000-memory.dmp

          Filesize

          64KB

        • memory/4272-168-0x00007FF90E8D0000-0x00007FF90E8E0000-memory.dmp

          Filesize

          64KB

        • memory/4272-169-0x00007FF90E8D0000-0x00007FF90E8E0000-memory.dmp

          Filesize

          64KB

        • memory/4272-170-0x00007FF90E8D0000-0x00007FF90E8E0000-memory.dmp

          Filesize

          64KB

        • memory/4272-171-0x00007FF90E8D0000-0x00007FF90E8E0000-memory.dmp

          Filesize

          64KB