Analysis

  • max time kernel
    152s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 13:30

General

  • Target

    8efa30c72d5955a6f5a59f112860e94fda16ad183790599496fd0662c1aaa94e.doc

  • Size

    45KB

  • MD5

    7bc63d03bd034729594b5ede0f0c85ad

  • SHA1

    9fbf82085222195c993b6e981f5853e70dc76493

  • SHA256

    8efa30c72d5955a6f5a59f112860e94fda16ad183790599496fd0662c1aaa94e

  • SHA512

    4abdbd314a17ff56e2be65c950a117661064e58a34a0561a1b9c2b8948e179c60bf8f7e91505296931a87c4d31f9add323d6e74bb611f54016fc57315e1586e9

  • SSDEEP

    384:h1T/Z7v5B1pS8mmTgIXqrOOeh6v0yGcS2rTm4V4Df7:hWkgIXgehwrX07

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8efa30c72d5955a6f5a59f112860e94fda16ad183790599496fd0662c1aaa94e.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2172

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN1009.lex

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • memory/2172-16-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-17-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-3-0x00007FFB028B0000-0x00007FFB028C0000-memory.dmp

          Filesize

          64KB

        • memory/2172-4-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-6-0x00007FFB028B0000-0x00007FFB028C0000-memory.dmp

          Filesize

          64KB

        • memory/2172-5-0x00007FFB028B0000-0x00007FFB028C0000-memory.dmp

          Filesize

          64KB

        • memory/2172-7-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-8-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-9-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-10-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-11-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-12-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-13-0x00007FFB000F0000-0x00007FFB00100000-memory.dmp

          Filesize

          64KB

        • memory/2172-14-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-2-0x00007FFB028B0000-0x00007FFB028C0000-memory.dmp

          Filesize

          64KB

        • memory/2172-15-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-18-0x00007FFB000F0000-0x00007FFB00100000-memory.dmp

          Filesize

          64KB

        • memory/2172-19-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-0-0x00007FFB028B0000-0x00007FFB028C0000-memory.dmp

          Filesize

          64KB

        • memory/2172-1-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-61-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-62-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-63-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-82-0x00007FFB028B0000-0x00007FFB028C0000-memory.dmp

          Filesize

          64KB

        • memory/2172-84-0x00007FFB028B0000-0x00007FFB028C0000-memory.dmp

          Filesize

          64KB

        • memory/2172-83-0x00007FFB028B0000-0x00007FFB028C0000-memory.dmp

          Filesize

          64KB

        • memory/2172-85-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-86-0x00007FFB028B0000-0x00007FFB028C0000-memory.dmp

          Filesize

          64KB

        • memory/2172-87-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-89-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB

        • memory/2172-88-0x00007FFB42830000-0x00007FFB42A25000-memory.dmp

          Filesize

          2.0MB