Analysis

  • max time kernel
    156s
  • max time network
    170s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10-03-2024 14:27

General

  • Target

    eicar_com.zip

  • Size

    184B

  • MD5

    6ce6f415d8475545be5ba114f208b0ff

  • SHA1

    d27265074c9eac2e2122ed69294dbc4d7cce9141

  • SHA256

    2546dcffc5ad854d4ddc64fbf056871cd5a00f2471cb7a5bfd4ac23b6e9eedad

  • SHA512

    d9305862fe0bf552718d19db43075d88cffd768974627db60fa1a90a8d45563e035a6449663b8f66aac53791d77f37dbb5035159aa08e69fc473972022f80010

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\eicar_com.zip
    1⤵
      PID:2748
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
      1⤵
        PID:3296
      • C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE"
        1⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4564

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4564-0-0x00007FF8C18B0000-0x00007FF8C18C0000-memory.dmp

        Filesize

        64KB

      • memory/4564-1-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-3-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-2-0x00007FF8C18B0000-0x00007FF8C18C0000-memory.dmp

        Filesize

        64KB

      • memory/4564-5-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-6-0x00007FF8C18B0000-0x00007FF8C18C0000-memory.dmp

        Filesize

        64KB

      • memory/4564-4-0x00007FF8C18B0000-0x00007FF8C18C0000-memory.dmp

        Filesize

        64KB

      • memory/4564-7-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-8-0x00007FF8C18B0000-0x00007FF8C18C0000-memory.dmp

        Filesize

        64KB

      • memory/4564-9-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-10-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-11-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-12-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-13-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-14-0x00007FF900E50000-0x00007FF900F0D000-memory.dmp

        Filesize

        756KB

      • memory/4564-15-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-16-0x00007FF8BF570000-0x00007FF8BF580000-memory.dmp

        Filesize

        64KB

      • memory/4564-17-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-18-0x00007FF900E50000-0x00007FF900F0D000-memory.dmp

        Filesize

        756KB

      • memory/4564-19-0x00007FF8BF570000-0x00007FF8BF580000-memory.dmp

        Filesize

        64KB

      • memory/4564-27-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-28-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-42-0x00007FF8C18B0000-0x00007FF8C18C0000-memory.dmp

        Filesize

        64KB

      • memory/4564-43-0x00007FF8C18B0000-0x00007FF8C18C0000-memory.dmp

        Filesize

        64KB

      • memory/4564-44-0x00007FF8C18B0000-0x00007FF8C18C0000-memory.dmp

        Filesize

        64KB

      • memory/4564-45-0x00007FF8C18B0000-0x00007FF8C18C0000-memory.dmp

        Filesize

        64KB

      • memory/4564-46-0x00007FF901820000-0x00007FF901A29000-memory.dmp

        Filesize

        2.0MB

      • memory/4564-47-0x00007FF900E50000-0x00007FF900F0D000-memory.dmp

        Filesize

        756KB