Analysis

  • max time kernel
    233s
  • max time network
    258s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-04-2024 13:50

General

  • Target

    weareverybeautifulgirlsxygirlwantokissmeharderthanbeforetogetmeback___sheisverybeeautifulgirlforme (1).rtf

  • Size

    73KB

  • MD5

    f8b201556d3c349d0fce9702c424c556

  • SHA1

    fbeb803116c8e7cb2a7d8a2ce73093ff5353a70c

  • SHA256

    16550f58e8ab8fbcf7dee33901008c44dd9fba3144e1edf94a0033afce770ea1

  • SHA512

    4b748096cebd1a991e8f6c3a166347347e845e740066f0cde806d33c6f92e65774ebd573dbd67ef6aecb824aa24a1ab56813c9fc612fee9b8372430cf250e88e

  • SSDEEP

    1536:Lz7jWDvjKzZpNCYkLFjImCK3jNB3vhWQI/M+vPKkRRa+FIvMGO:LvjWDrKzmL9IM3jNRhW1M+nKkRRa+FIQ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\weareverybeautifulgirlsxygirlwantokissmeharderthanbeforetogetmeback___sheisverybeeautifulgirlforme (1).rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD798.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • memory/4916-18-0x00007FFE9BFB0000-0x00007FFE9BFC0000-memory.dmp

    Filesize

    64KB

  • memory/4916-10-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-3-0x00007FFE9FB20000-0x00007FFE9FB30000-memory.dmp

    Filesize

    64KB

  • memory/4916-19-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-4-0x00007FFE9FB20000-0x00007FFE9FB30000-memory.dmp

    Filesize

    64KB

  • memory/4916-8-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-9-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-21-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-11-0x00007FFE9BFB0000-0x00007FFE9BFC0000-memory.dmp

    Filesize

    64KB

  • memory/4916-12-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-13-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-14-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-15-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-23-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-17-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-0-0x00007FFE9FB20000-0x00007FFE9FB30000-memory.dmp

    Filesize

    64KB

  • memory/4916-5-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-2-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-16-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-24-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-28-0x00007FFEDF9E0000-0x00007FFEDFA8E000-memory.dmp

    Filesize

    696KB

  • memory/4916-27-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-29-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-30-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-31-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-32-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-33-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-34-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-35-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-207-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-208-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-209-0x00007FFEDFA90000-0x00007FFEDFC6B000-memory.dmp

    Filesize

    1.9MB

  • memory/4916-1-0x00007FFE9FB20000-0x00007FFE9FB30000-memory.dmp

    Filesize

    64KB