Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2023, 15:34

General

  • Target

    5483c4d5bd2f86ae17a02583ca1264c1.rtf

  • Size

    227KB

  • MD5

    5483c4d5bd2f86ae17a02583ca1264c1

  • SHA1

    2fe0ad2983ee1f8a71aca5727c65d3ae9e54fdc8

  • SHA256

    0352d3068460a1f9e366d76d3bc508449f0fceaf5a73a45e821cf11ba38bf6bf

  • SHA512

    b2cdff776ee97ae2afbbf8aeb553e08a26e7170a78642fbb51d653168f62e295b4d8ac763fab539640fcbff6ee5be2e477c1074b2757b89edd6fcc5006cb5b54

  • SSDEEP

    768:gwAbZSibMX9gRWj75vSln/16AiMqcho7tdn6MRwlz07ftrLI0:gwAlRIvSln/6Mlho7tdn6Xlz0TtrLI0

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5483c4d5bd2f86ae17a02583ca1264c1.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/228-0-0x00007FF944DD0000-0x00007FF944DE0000-memory.dmp

    Filesize

    64KB

  • memory/228-1-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-3-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-5-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-4-0x00007FF944DD0000-0x00007FF944DE0000-memory.dmp

    Filesize

    64KB

  • memory/228-2-0x00007FF944DD0000-0x00007FF944DE0000-memory.dmp

    Filesize

    64KB

  • memory/228-6-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-8-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-7-0x00007FF944DD0000-0x00007FF944DE0000-memory.dmp

    Filesize

    64KB

  • memory/228-9-0x00007FF944DD0000-0x00007FF944DE0000-memory.dmp

    Filesize

    64KB

  • memory/228-10-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-11-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-12-0x00007FF942BD0000-0x00007FF942BE0000-memory.dmp

    Filesize

    64KB

  • memory/228-13-0x00007FF942BD0000-0x00007FF942BE0000-memory.dmp

    Filesize

    64KB

  • memory/228-22-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-23-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-24-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-25-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-50-0x00007FF944DD0000-0x00007FF944DE0000-memory.dmp

    Filesize

    64KB

  • memory/228-51-0x00007FF944DD0000-0x00007FF944DE0000-memory.dmp

    Filesize

    64KB

  • memory/228-53-0x00007FF944DD0000-0x00007FF944DE0000-memory.dmp

    Filesize

    64KB

  • memory/228-52-0x00007FF944DD0000-0x00007FF944DE0000-memory.dmp

    Filesize

    64KB

  • memory/228-54-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-55-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB

  • memory/228-56-0x00007FF984D50000-0x00007FF984F45000-memory.dmp

    Filesize

    2.0MB