Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 15:38

General

  • Target

    microsoftinteroirdesignsectiontocompleteentireprocesstodevelopthenewsystemtechnologytounderstand (1).rtf

  • Size

    64KB

  • MD5

    eaf57752e189fbdb0894a43ed390efe6

  • SHA1

    14b2ad64c23a473469560bdcaac2ef47c0fa544b

  • SHA256

    1de402b1aa5fcf8a3782a2656b75dd8e943b68e181acc45ef85b32df95f2b640

  • SHA512

    e0fe29cbb93dda62ee689712f83ac5043eb93e9372f2e64c23e1e42b0e6e8e2fd81334697793a755b30f2f0f70d8b685eea24507a750f28909437a6b4d1481d6

  • SSDEEP

    1536:oKxmiZJ0gYNb7MFKfoZyXvjz2catCKVJkfEKSl:x1BFTZ2CgKVJkMKa

Score
10/10

Malware Config

Signatures

  • Kinsing

    Kinsing is a loader written in Golang.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\microsoftinteroirdesignsectiontocompleteentireprocesstodevelopthenewsystemtechnologytounderstand (1).rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1300-0-0x00007FFDF9690000-0x00007FFDF96A0000-memory.dmp
    Filesize

    64KB

  • memory/1300-2-0x00007FFDF9690000-0x00007FFDF96A0000-memory.dmp
    Filesize

    64KB

  • memory/1300-1-0x00007FFDF9690000-0x00007FFDF96A0000-memory.dmp
    Filesize

    64KB

  • memory/1300-3-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-5-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-4-0x00007FFDF9690000-0x00007FFDF96A0000-memory.dmp
    Filesize

    64KB

  • memory/1300-6-0x00007FFDF9690000-0x00007FFDF96A0000-memory.dmp
    Filesize

    64KB

  • memory/1300-7-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-8-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-9-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-10-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-11-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-12-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-13-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-15-0x00007FFDF75D0000-0x00007FFDF75E0000-memory.dmp
    Filesize

    64KB

  • memory/1300-14-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-16-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-18-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-17-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-19-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-21-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB

  • memory/1300-20-0x00007FFDF75D0000-0x00007FFDF75E0000-memory.dmp
    Filesize

    64KB

  • memory/1300-35-0x00007FFE39610000-0x00007FFE39805000-memory.dmp
    Filesize

    2.0MB