Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2023 08:50

General

  • Target

    8ce2f866187d1993dbf4e0c850d112d0.doc

  • Size

    198KB

  • MD5

    8ce2f866187d1993dbf4e0c850d112d0

  • SHA1

    957e57aed77af5cd95e232bec8c4d55d31cd83b0

  • SHA256

    efdf5d9470d62b3e2bad4f44494bec8633861b9a69b2b4ea83664ecde7ea33f2

  • SHA512

    fe3afcc9635702472dbc961b039e909d7f3c41735ebc5c5e0ab45a27b55a380977ee2188389f22d4db1fdb5d0dae77771a24e93aab228aba9817afbcfcd230a2

  • SSDEEP

    3072:85XulxpvOEJW178sn0zifCY+CNW7i1ScG8BZDgQQN+7IbsxpvOEJW17g/:85elxpvfOApzmCjmlGinQJgxpvfOE

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8ce2f866187d1993dbf4e0c850d112d0.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3832
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\1D73EC3B.wmf

      Filesize

      1.0MB

      MD5

      49076e72ca5ef3c528889277590ff122

      SHA1

      4400ef5defbaa2acbf5dfd6070bb150265a6fb13

      SHA256

      442f2912a598e40114a86b83b725968a3048e10f25367916247bb4322b3221a3

      SHA512

      1cd3510f41fc186b1f69f2db7a98f4952009c7139a7887e79d1765a470254358fdfea3095ceef6528267d2ddd7c55d1a694fe87df78faea68713f89253773637

    • memory/3832-23-0x0000025A81010000-0x0000025A81FE0000-memory.dmp

      Filesize

      15.8MB

    • memory/3832-59-0x00007FFE14470000-0x00007FFE14480000-memory.dmp

      Filesize

      64KB

    • memory/3832-13-0x00007FFE11B10000-0x00007FFE11B20000-memory.dmp

      Filesize

      64KB

    • memory/3832-5-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-2-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-6-0x00007FFE14470000-0x00007FFE14480000-memory.dmp

      Filesize

      64KB

    • memory/3832-7-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-8-0x00007FFE14470000-0x00007FFE14480000-memory.dmp

      Filesize

      64KB

    • memory/3832-9-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-10-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-11-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-12-0x00007FFE11B10000-0x00007FFE11B20000-memory.dmp

      Filesize

      64KB

    • memory/3832-4-0x00007FFE14470000-0x00007FFE14480000-memory.dmp

      Filesize

      64KB

    • memory/3832-3-0x00007FFE14470000-0x00007FFE14480000-memory.dmp

      Filesize

      64KB

    • memory/3832-63-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-25-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-0-0x00007FFE14470000-0x00007FFE14480000-memory.dmp

      Filesize

      64KB

    • memory/3832-34-0x0000025A81010000-0x0000025A81FE0000-memory.dmp

      Filesize

      15.8MB

    • memory/3832-58-0x00007FFE14470000-0x00007FFE14480000-memory.dmp

      Filesize

      64KB

    • memory/3832-61-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-60-0x00007FFE14470000-0x00007FFE14480000-memory.dmp

      Filesize

      64KB

    • memory/3832-24-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-64-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-65-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-62-0x00007FFE14470000-0x00007FFE14480000-memory.dmp

      Filesize

      64KB

    • memory/3832-66-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3832-1-0x00007FFE543F0000-0x00007FFE545E5000-memory.dmp

      Filesize

      2.0MB