Resubmissions

21/09/2023, 16:45

230921-t9s18abd77 1

21/09/2023, 14:59

230921-sc399aag84 1

21/09/2023, 14:56

230921-sa7jwsgh2t 1

21/09/2023, 14:52

230921-r8qhlaag58 1

Analysis

  • max time kernel
    143s
  • max time network
    276s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    21/09/2023, 16:45

General

  • Target

    Security Check, Deutsche Kreditbank Aktiengesellschaft.doc

  • Size

    39KB

  • MD5

    ce8ec53592490521d1fe48ba6c890a6c

  • SHA1

    0b61ca279a372ffbb2f5d4bd552a8592b95d9d4a

  • SHA256

    8cc7f5782d622470c421433aedbe33620a1a2830d83729c7569fc5e46fdbbadb

  • SHA512

    07580f19bcd0aa0b76cf53810f8e8f0d83c1f8916a5f248a46cdb5fd6475ec72481157b4a2e8b2ffe1e2bea7eb6e0240f306213f269d9e2b65aaf33bb3f63918

  • SSDEEP

    768:jJyt6FPzPuVJ5whEJy825PZ38Pde79+/Z+YMf9MVkLkOIZw3hDvxz99:8j+YMFlL/ZRDv3

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Security Check, Deutsche Kreditbank Aktiengesellschaft.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4124

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • memory/4124-8-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-19-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-4-0x00007FF7F3610000-0x00007FF7F3620000-memory.dmp

          Filesize

          64KB

        • memory/4124-5-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-7-0x00007FF7F3610000-0x00007FF7F3620000-memory.dmp

          Filesize

          64KB

        • memory/4124-6-0x00007FF7F3610000-0x00007FF7F3620000-memory.dmp

          Filesize

          64KB

        • memory/4124-2-0x00007FF7F3610000-0x00007FF7F3620000-memory.dmp

          Filesize

          64KB

        • memory/4124-0-0x00007FF7F3610000-0x00007FF7F3620000-memory.dmp

          Filesize

          64KB

        • memory/4124-9-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-11-0x00007FF7F0CB0000-0x00007FF7F0CC0000-memory.dmp

          Filesize

          64KB

        • memory/4124-10-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-12-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-13-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-15-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-16-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-17-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-3-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-20-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-14-0x00007FF7F0CB0000-0x00007FF7F0CC0000-memory.dmp

          Filesize

          64KB

        • memory/4124-21-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-22-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-23-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-18-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-1-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-34-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-35-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-36-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-57-0x00007FF7F3610000-0x00007FF7F3620000-memory.dmp

          Filesize

          64KB

        • memory/4124-58-0x00007FF7F3610000-0x00007FF7F3620000-memory.dmp

          Filesize

          64KB

        • memory/4124-61-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB

        • memory/4124-60-0x00007FF7F3610000-0x00007FF7F3620000-memory.dmp

          Filesize

          64KB

        • memory/4124-59-0x00007FF7F3610000-0x00007FF7F3620000-memory.dmp

          Filesize

          64KB

        • memory/4124-62-0x00007FF833590000-0x00007FF833785000-memory.dmp

          Filesize

          2.0MB