Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-04-2024 01:13

General

  • Target

    Challenge_FIles/Employee_W2_Form.docx

  • Size

    12KB

  • MD5

    45e7d6562bfddb816d45649dd667abde

  • SHA1

    00087e46ec0ef6225de59868fd016bd9dd77fa3c

  • SHA256

    679bbe0c50754853978a3a583505ebb99bce720cf26a6aaf8be06cd879701ff1

  • SHA512

    0567873b42eece93787da4f4c3b72ecb0d952450d8eb59b354a5f91ed95395a2662171e05cdcf4a829fdbd0b5cbcca97701fef9b96b1ad0d8728922bbd0288fa

  • SSDEEP

    192:f6ijVmar18H111M05AgPekrFD2h0vsmyVk7PeOJ2wc3rMKkokceeQh:f6ijca6H111/eo1hvsHieIhoseQh

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Challenge_FIles\Employee_W2_Form.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2076
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3840 --field-trial-handle=2288,i,11069632825633797559,14829202121434726371,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:6008
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:7124
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:7060

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851223[[fn=iso690]].xsl

        Filesize

        263KB

        MD5

        ff0e07eff1333cdf9fc2523d323dd654

        SHA1

        77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

        SHA256

        3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

        SHA512

        b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

      • memory/2076-16-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-8-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-4-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-17-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-5-0x00007FFC24490000-0x00007FFC244A0000-memory.dmp

        Filesize

        64KB

      • memory/2076-6-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-7-0x00007FFC24490000-0x00007FFC244A0000-memory.dmp

        Filesize

        64KB

      • memory/2076-18-0x00007FFC21BD0000-0x00007FFC21BE0000-memory.dmp

        Filesize

        64KB

      • memory/2076-9-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-10-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-11-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-12-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-13-0x00007FFC21BD0000-0x00007FFC21BE0000-memory.dmp

        Filesize

        64KB

      • memory/2076-35-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-15-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-0-0x00007FFC24490000-0x00007FFC244A0000-memory.dmp

        Filesize

        64KB

      • memory/2076-3-0x00007FFC24490000-0x00007FFC244A0000-memory.dmp

        Filesize

        64KB

      • memory/2076-2-0x00007FFC24490000-0x00007FFC244A0000-memory.dmp

        Filesize

        64KB

      • memory/2076-14-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-36-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-37-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-1-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-536-0x00007FFC24490000-0x00007FFC244A0000-memory.dmp

        Filesize

        64KB

      • memory/2076-537-0x00007FFC24490000-0x00007FFC244A0000-memory.dmp

        Filesize

        64KB

      • memory/2076-539-0x00007FFC24490000-0x00007FFC244A0000-memory.dmp

        Filesize

        64KB

      • memory/2076-538-0x00007FFC24490000-0x00007FFC244A0000-memory.dmp

        Filesize

        64KB

      • memory/2076-540-0x00007FFC64410000-0x00007FFC64605000-memory.dmp

        Filesize

        2.0MB

      • memory/7060-541-0x0000017A11290000-0x0000017A112A0000-memory.dmp

        Filesize

        64KB

      • memory/7060-557-0x0000017A11390000-0x0000017A113A0000-memory.dmp

        Filesize

        64KB

      • memory/7060-573-0x0000017A19700000-0x0000017A19701000-memory.dmp

        Filesize

        4KB

      • memory/7060-575-0x0000017A19730000-0x0000017A19731000-memory.dmp

        Filesize

        4KB

      • memory/7060-576-0x0000017A19730000-0x0000017A19731000-memory.dmp

        Filesize

        4KB

      • memory/7060-577-0x0000017A19840000-0x0000017A19841000-memory.dmp

        Filesize

        4KB