Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 23:14

General

  • Target

    dd1cdc54ffeda1cbb365292aee4b020dc11d9a80c91667e19a5d5ee9872cb0b8.doc

  • Size

    301KB

  • MD5

    955354491dec7eaecbd84bc1b72e9e47

  • SHA1

    3f6f9253f7188204095ad2d26b01492501ad0dad

  • SHA256

    dd1cdc54ffeda1cbb365292aee4b020dc11d9a80c91667e19a5d5ee9872cb0b8

  • SHA512

    f29b0b4f0834a7d4c43f52637365a01a5741e07e7cf72792ee8e0726bb6bc3b389e406f2a02d9cc030f9a9952e4fedf2d9705b39da052a4026879b5420076e46

  • SSDEEP

    6144:2j7mtFt+P5r4lqBjNpLjhQLZ4w/e8HMi9Ul:Q7mp+P5VNpLjhQLZ4w/e8HMi9Ul

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dd1cdc54ffeda1cbb365292aee4b020dc11d9a80c91667e19a5d5ee9872cb0b8.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2312-0-0x00007FFF823B0000-0x00007FFF823C0000-memory.dmp

    Filesize

    64KB

  • memory/2312-2-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-1-0x00007FFF823B0000-0x00007FFF823C0000-memory.dmp

    Filesize

    64KB

  • memory/2312-3-0x00007FFF823B0000-0x00007FFF823C0000-memory.dmp

    Filesize

    64KB

  • memory/2312-6-0x00007FFF823B0000-0x00007FFF823C0000-memory.dmp

    Filesize

    64KB

  • memory/2312-5-0x00007FFF823B0000-0x00007FFF823C0000-memory.dmp

    Filesize

    64KB

  • memory/2312-4-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-7-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-8-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-9-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-11-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-12-0x00007FFF80160000-0x00007FFF80170000-memory.dmp

    Filesize

    64KB

  • memory/2312-10-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-13-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-14-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-15-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-16-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-17-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-19-0x00007FFF80160000-0x00007FFF80170000-memory.dmp

    Filesize

    64KB

  • memory/2312-18-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-20-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-21-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-22-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-23-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB

  • memory/2312-35-0x00007FFFC2330000-0x00007FFFC2525000-memory.dmp

    Filesize

    2.0MB