Analysis

  • max time kernel
    23s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 07:50

General

  • Target

    4dc2c5b3507bb59f89bc82f467619ca6.doc

  • Size

    39KB

  • MD5

    4dc2c5b3507bb59f89bc82f467619ca6

  • SHA1

    6487dde396a3908cebd4b164460a37a52953af92

  • SHA256

    1b0ab8f5b954d45b02cbca63e59ff2bcd134a8926742689eb64e7840cf379f45

  • SHA512

    22737ff2a5e890e523ce8b3a899f012627f8e7c03014cae8766bfe543668245144aa0e298fff4222872f0a54588c6e74b3bc2ee2f971437128a46bbe6d6f3b52

  • SSDEEP

    384:EwH1l1MgPOOaKU0btl2EBFltdvLEm0nBMjHUut:V1l1MyOGLWEBftdvLqU

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4dc2c5b3507bb59f89bc82f467619ca6.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\D5ACDC09.wmf

    Filesize

    880B

    MD5

    0522d8dcdc9860ea7f4b9966c5d466b9

    SHA1

    7dd16a4d0159a3c2bc81fdb7893a0ebdf925bdc1

    SHA256

    80742dade91f8c7521277ea827aa93e8a13d100997a24f9afb4e3568224cb8d0

    SHA512

    0ab2c5abbf5823d36d452440d1f0d8dd1e0f297855dbb8536de9eccad29e62c2585f81fd2f3f6e804221421f011482b10f402645ae0784dd550269452c5c6c08

  • memory/1424-1-0x00007FFF21AD0000-0x00007FFF21AE0000-memory.dmp

    Filesize

    64KB

  • memory/1424-5-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-8-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-9-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-10-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-11-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-12-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-13-0x00007FFF1F250000-0x00007FFF1F260000-memory.dmp

    Filesize

    64KB

  • memory/1424-0-0x00007FFF21AD0000-0x00007FFF21AE0000-memory.dmp

    Filesize

    64KB

  • memory/1424-3-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-6-0x00007FFF21AD0000-0x00007FFF21AE0000-memory.dmp

    Filesize

    64KB

  • memory/1424-2-0x00007FFF21AD0000-0x00007FFF21AE0000-memory.dmp

    Filesize

    64KB

  • memory/1424-7-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-14-0x00007FFF1F250000-0x00007FFF1F260000-memory.dmp

    Filesize

    64KB

  • memory/1424-17-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-18-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-4-0x00007FFF21AD0000-0x00007FFF21AE0000-memory.dmp

    Filesize

    64KB

  • memory/1424-63-0x00007FFF21AD0000-0x00007FFF21AE0000-memory.dmp

    Filesize

    64KB

  • memory/1424-67-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-66-0x00007FFF61A50000-0x00007FFF61C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-65-0x00007FFF21AD0000-0x00007FFF21AE0000-memory.dmp

    Filesize

    64KB

  • memory/1424-64-0x00007FFF21AD0000-0x00007FFF21AE0000-memory.dmp

    Filesize

    64KB

  • memory/1424-62-0x00007FFF21AD0000-0x00007FFF21AE0000-memory.dmp

    Filesize

    64KB