Resubmissions

09/02/2024, 13:49

240209-q4wclsbf9x 1

10/10/2023, 13:53

231010-q6zstadh3z 4

Analysis

  • max time kernel
    148s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 13:53

General

  • Target

    Order Specification.docx

  • Size

    1.9MB

  • MD5

    8417c579dc41ca5bf7e917121a3b3e49

  • SHA1

    5caec24751932b1152125e2b405364b7a2762291

  • SHA256

    6180214e6bac17bdaa2b0a17490cc17a13ad2cf0aed7061910e6e58552afc0db

  • SHA512

    72d3622e0d0774b9c7d488ffdd2c473094170bcdd81fb0fbdb02502fb19ac2e4dd518ad59a439c60c05a3658594504126c655c4720ee11bfd77ecf1c4364afe1

  • SSDEEP

    49152:J2AXONpW9eRk6vnJgxsihNHivFyBKsTCCBXL0x6hTe46hyE/L3xd98:J2fNNu6v2xsiLivFdqCGoQhC4iZ/LxdG

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Order Specification.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\D40C5E0.emf

    Filesize

    5KB

    MD5

    d3f85acc7fde0b72c69bb97e7746c666

    SHA1

    ab6492be0ba3d02a69a520021b50029026340790

    SHA256

    af2777323520bc44447af0e66e48e43cd8955bec08586b763bd590b27ee1ba7d

    SHA512

    25d7faf0c81ac76dd8d425e53c9a7d0b1a2277765c1f3d91f8ca38ea0d17d43ec653b1460548a10eeb212e8995bda399a52c83ea14ca3518af9748966ce643c6

  • memory/4432-16-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-17-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-2-0x00007FFD41A50000-0x00007FFD41A60000-memory.dmp

    Filesize

    64KB

  • memory/4432-4-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-6-0x00007FFD41A50000-0x00007FFD41A60000-memory.dmp

    Filesize

    64KB

  • memory/4432-5-0x00007FFD41A50000-0x00007FFD41A60000-memory.dmp

    Filesize

    64KB

  • memory/4432-7-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-8-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-9-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-10-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-11-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-12-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-13-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-14-0x00007FFD3F510000-0x00007FFD3F520000-memory.dmp

    Filesize

    64KB

  • memory/4432-3-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-15-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-19-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-18-0x00007FFD3F510000-0x00007FFD3F520000-memory.dmp

    Filesize

    64KB

  • memory/4432-0-0x00007FFD41A50000-0x00007FFD41A60000-memory.dmp

    Filesize

    64KB

  • memory/4432-20-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-1-0x00007FFD41A50000-0x00007FFD41A60000-memory.dmp

    Filesize

    64KB

  • memory/4432-34-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-35-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-39-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-62-0x00007FFD41A50000-0x00007FFD41A60000-memory.dmp

    Filesize

    64KB

  • memory/4432-63-0x00007FFD41A50000-0x00007FFD41A60000-memory.dmp

    Filesize

    64KB

  • memory/4432-64-0x00007FFD41A50000-0x00007FFD41A60000-memory.dmp

    Filesize

    64KB

  • memory/4432-66-0x00007FFD41A50000-0x00007FFD41A60000-memory.dmp

    Filesize

    64KB

  • memory/4432-65-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-67-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-68-0x00007FFD819D0000-0x00007FFD81BC5000-memory.dmp

    Filesize

    2.0MB