Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-03-2024 02:41

General

  • Target

    aa48be12373eee7adb43270e7adde9a854875ceebd5c267fa6bbb79e91ce2030.rtf

  • Size

    70KB

  • MD5

    cae8bb9d33e2340998ba5f75ad37f803

  • SHA1

    75e142060680509acade4921ea417e1d438a34fd

  • SHA256

    aa48be12373eee7adb43270e7adde9a854875ceebd5c267fa6bbb79e91ce2030

  • SHA512

    5b5ba31eef6383798733fcb5bbbbe0b28a35b8962207b8a08c494aa18ce48cf4f296af18299b8ddff51b7d6eb07d4864b3ddf4f95bebc8c76959f8ba1e0f8d98

  • SSDEEP

    1536:z8dfmjJH0y/OSefByvp/9/7otRf9rdO5WeIGLTlGrzYNY:z8dfW0yvDToXf9rd2WeI0RGYNY

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\aa48be12373eee7adb43270e7adde9a854875ceebd5c267fa6bbb79e91ce2030.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3828
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3904 --field-trial-handle=2256,i,6057863739127169200,6895476048812676039,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3828-0-0x00007FFF608D0000-0x00007FFF608E0000-memory.dmp

      Filesize

      64KB

    • memory/3828-1-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-4-0x00007FFF608D0000-0x00007FFF608E0000-memory.dmp

      Filesize

      64KB

    • memory/3828-3-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-5-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-2-0x00007FFF608D0000-0x00007FFF608E0000-memory.dmp

      Filesize

      64KB

    • memory/3828-6-0x00007FFF608D0000-0x00007FFF608E0000-memory.dmp

      Filesize

      64KB

    • memory/3828-8-0x00007FFF608D0000-0x00007FFF608E0000-memory.dmp

      Filesize

      64KB

    • memory/3828-7-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-9-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-10-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-11-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-12-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-13-0x00007FFF5E630000-0x00007FFF5E640000-memory.dmp

      Filesize

      64KB

    • memory/3828-14-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-15-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-16-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-17-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-18-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-19-0x00007FFF5E630000-0x00007FFF5E640000-memory.dmp

      Filesize

      64KB

    • memory/3828-20-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-34-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-35-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-36-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-59-0x00007FFF608D0000-0x00007FFF608E0000-memory.dmp

      Filesize

      64KB

    • memory/3828-60-0x00007FFF608D0000-0x00007FFF608E0000-memory.dmp

      Filesize

      64KB

    • memory/3828-61-0x00007FFF608D0000-0x00007FFF608E0000-memory.dmp

      Filesize

      64KB

    • memory/3828-64-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-63-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB

    • memory/3828-62-0x00007FFF608D0000-0x00007FFF608E0000-memory.dmp

      Filesize

      64KB

    • memory/3828-65-0x00007FFFA0850000-0x00007FFFA0A45000-memory.dmp

      Filesize

      2.0MB