Overview
overview
10Static
static
10Challenge_...m.docx
windows7-x64
4Challenge_...m.docx
windows10-2004-x64
1Challenge_...1.docx
windows7-x64
4Challenge_...1.docx
windows10-2004-x64
1Challenge_...y.docx
windows7-x64
4Challenge_...y.docx
windows10-2004-x64
1Challenge_...1.docx
windows7-x64
4Challenge_...1.docx
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 08:52
Static task
static1
Behavioral task
behavioral1
Sample
Challenge_FIles/Employee_W2_Form.docx
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Challenge_FIles/Employee_W2_Form.docx
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
Challenge_FIles/Employees_Contact_Audit_Oct_2021.docx
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Challenge_FIles/Employees_Contact_Audit_Oct_2021.docx
Resource
win10v2004-20230831-en
Behavioral task
behavioral5
Sample
Challenge_FIles/Work_From_Home_Survey.docx
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Challenge_FIles/Work_From_Home_Survey.docx
Resource
win10v2004-20230831-en
Behavioral task
behavioral7
Sample
Challenge_FIles/income_tax_and_benefit_return_2021.docx
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Challenge_FIles/income_tax_and_benefit_return_2021.docx
Resource
win10v2004-20230831-en
General
-
Target
Challenge_FIles/Employee_W2_Form.docx
-
Size
12KB
-
MD5
45e7d6562bfddb816d45649dd667abde
-
SHA1
00087e46ec0ef6225de59868fd016bd9dd77fa3c
-
SHA256
679bbe0c50754853978a3a583505ebb99bce720cf26a6aaf8be06cd879701ff1
-
SHA512
0567873b42eece93787da4f4c3b72ecb0d952450d8eb59b354a5f91ed95395a2662171e05cdcf4a829fdbd0b5cbcca97701fef9b96b1ad0d8728922bbd0288fa
-
SSDEEP
192:f6ijVmar18H111M05AgPekrFD2h0vsmyVk7PeOJ2wc3rMKkokceeQh:f6ijca6H111/eo1hvsHieIhoseQh
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\Challenge_FIles\mhtml:arsenal.30cm.tw:1212\word.html!x-usc:arsenal.30cm.tw:1212\word.html WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 224 WINWORD.EXE 224 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Challenge_FIles\Employee_W2_Form.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/224-0-0x00007FF859A90000-0x00007FF859AA0000-memory.dmpFilesize
64KB
-
memory/224-1-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-2-0x00007FF859A90000-0x00007FF859AA0000-memory.dmpFilesize
64KB
-
memory/224-3-0x00007FF859A90000-0x00007FF859AA0000-memory.dmpFilesize
64KB
-
memory/224-6-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-5-0x00007FF859A90000-0x00007FF859AA0000-memory.dmpFilesize
64KB
-
memory/224-4-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-7-0x00007FF859A90000-0x00007FF859AA0000-memory.dmpFilesize
64KB
-
memory/224-8-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-9-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-10-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-11-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-12-0x00007FF8573F0000-0x00007FF857400000-memory.dmpFilesize
64KB
-
memory/224-13-0x00007FF8573F0000-0x00007FF857400000-memory.dmpFilesize
64KB
-
memory/224-14-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-15-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-16-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-17-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-21-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-22-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-23-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-24-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-25-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-48-0x00007FF859A90000-0x00007FF859AA0000-memory.dmpFilesize
64KB
-
memory/224-50-0x00007FF859A90000-0x00007FF859AA0000-memory.dmpFilesize
64KB
-
memory/224-51-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-49-0x00007FF859A90000-0x00007FF859AA0000-memory.dmpFilesize
64KB
-
memory/224-53-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-54-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-55-0x00007FF899A10000-0x00007FF899C05000-memory.dmpFilesize
2.0MB
-
memory/224-52-0x00007FF859A90000-0x00007FF859AA0000-memory.dmpFilesize
64KB