Analysis

  • max time kernel
    104s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/06/2023, 10:07

General

  • Target

    FROM MRS.PATRICIA ANDERSON 2023.doc

  • Size

    25KB

  • MD5

    ef252afe7cd5417a8f8d84b129fff04b

  • SHA1

    eba8704efb8a84984f8c6e830280be6271c41a06

  • SHA256

    c100bf8aa68fcd9001c52823e15d24c70fe15932e591fd376c65705a6fe15578

  • SHA512

    5bc3481c19934e5b0c8b04ae053a1da39be8d55e64c6fa51973d47fc808d7fc7396d7d3586358e3f33c97a151c1e59bbe7385e8bdfc172f450b793a1223c3b60

  • SSDEEP

    192:P8VB3P36xa4tJowtbiBlcmbdlSEEytyGc6ri5bv/0ylwZFedlbj+zK6dq:AB3SxBfowxmc+dXyGcS2rwXoln+zQ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\FROM MRS.PATRICIA ANDERSON 2023.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4548

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4548-133-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

          Filesize

          64KB

        • memory/4548-134-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

          Filesize

          64KB

        • memory/4548-135-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

          Filesize

          64KB

        • memory/4548-136-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

          Filesize

          64KB

        • memory/4548-137-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

          Filesize

          64KB

        • memory/4548-138-0x00007FFD3EAA0000-0x00007FFD3EAB0000-memory.dmp

          Filesize

          64KB

        • memory/4548-139-0x00007FFD3EAA0000-0x00007FFD3EAB0000-memory.dmp

          Filesize

          64KB

        • memory/4548-167-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

          Filesize

          64KB

        • memory/4548-168-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

          Filesize

          64KB

        • memory/4548-169-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

          Filesize

          64KB

        • memory/4548-170-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

          Filesize

          64KB