Analysis

  • max time kernel
    108s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2023 15:24

General

  • Target

    ModeloAbilioorçamento-RECUPERAÇÃO - 2022.doc

  • Size

    99KB

  • MD5

    c55e09490f689e92f6b9a7532cd5dc11

  • SHA1

    84ffad2868eb2a0884078163edf0207749bf0646

  • SHA256

    50204ffffd59bc65b4cf1b67b7198c6d46b051b1ae95d211fe6e277813b3fcbe

  • SHA512

    7be1ae6a680d5ca61442e40db57ee215ec01d35ba3476442896251c5fd80d2cc2b43f9db136fa252d6d827af51ded3a4fc88494c1e031a0ee307707836e6f20d

  • SSDEEP

    1536:sk/TIS6o5jVZ25sWWGQ21ZjlOAE3ZsE1YY79no66B/TUfDY3:suzjrSsND21ZRV2ZsE1YY7ho6QT

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ModeloAbilioorçamento-RECUPERAÇÃO - 2022.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2484

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2484-133-0x00007FF802330000-0x00007FF802340000-memory.dmp

    Filesize

    64KB

  • memory/2484-134-0x00007FF802330000-0x00007FF802340000-memory.dmp

    Filesize

    64KB

  • memory/2484-135-0x00007FF802330000-0x00007FF802340000-memory.dmp

    Filesize

    64KB

  • memory/2484-136-0x00007FF802330000-0x00007FF802340000-memory.dmp

    Filesize

    64KB

  • memory/2484-137-0x00007FF802330000-0x00007FF802340000-memory.dmp

    Filesize

    64KB

  • memory/2484-138-0x00007FF7FF9D0000-0x00007FF7FF9E0000-memory.dmp

    Filesize

    64KB

  • memory/2484-139-0x00007FF7FF9D0000-0x00007FF7FF9E0000-memory.dmp

    Filesize

    64KB

  • memory/2484-169-0x00007FF802330000-0x00007FF802340000-memory.dmp

    Filesize

    64KB

  • memory/2484-170-0x00007FF802330000-0x00007FF802340000-memory.dmp

    Filesize

    64KB

  • memory/2484-171-0x00007FF802330000-0x00007FF802340000-memory.dmp

    Filesize

    64KB

  • memory/2484-172-0x00007FF802330000-0x00007FF802340000-memory.dmp

    Filesize

    64KB