Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 13:20

General

  • Target

    our project templet test/our project templet test.docx

  • Size

    108KB

  • MD5

    515a1ba1611a2212b4b6d2ae121898ad

  • SHA1

    6214855065576ec84a0ff1f6fa3a4a69be20122e

  • SHA256

    332794745f5622beb843399e988a12b2d388c97c92ff1860f847b4aeadc5e0a0

  • SHA512

    58f8a5b000297dbb74741792b12b5eae5e05c16a5102d68b60c6c1c8dc866350466ac829bbd38fe69a52bf5195cea481ea4de758babab5b0cb97648d5768467a

  • SSDEEP

    3072:MeL3WwspME/+buj2GixpE4qcO+a+W5bg2cWz0s0X:Mm39spXotlOdh5bg2NzEX

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 18 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\our project templet test\our project templet test.docx" /o ""
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\mso76EB.tmp

    Filesize

    5KB

    MD5

    c4c38a7d937c652fe5c5a39c668f8d86

    SHA1

    baacab0836afc11765e1896388d06f7a5deb9253

    SHA256

    48b090cbfa1300a7a60f6eaafa08ddaccfc96943c8a3e943a4b9d9e45a18b52a

    SHA512

    68c53bf3920cf12e2bcf5129dfe2ac61b4a0ef4bff6692daed401e53fda7eeda73a80ff13ed83d29fb03f97b8c5f5f3ad88890acffd3c12df0f3710dcd4d7caf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{C9B695C2-6AC5-44F6-85FF-32B162F8D9FE}.tmp

    Filesize

    1024B

    MD5

    5d4d94ee7e06bbb0af9584119797b23a

    SHA1

    dbb111419c704f116efa8e72471dd83e86e49677

    SHA256

    4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1

    SHA512

    95f83ae84cafcced5eaf504546725c34d5f9710e5ca2d11761486970f2fbeccb25f9cf50bbfc272bd75e1a66a18b7783f09e1c1454afda519624bc2bb2f28ba4

  • C:\Users\Admin\AppData\Local\Temp\TCDACCF.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/4500-6-0x00007FFAE8330000-0x00007FFAE8340000-memory.dmp

    Filesize

    64KB

  • memory/4500-11-0x00007FFAE6090000-0x00007FFAE60A0000-memory.dmp

    Filesize

    64KB

  • memory/4500-5-0x00007FFAE8330000-0x00007FFAE8340000-memory.dmp

    Filesize

    64KB

  • memory/4500-7-0x00007FFB282B0000-0x00007FFB284A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4500-8-0x00007FFB282B0000-0x00007FFB284A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4500-9-0x00007FFB282B0000-0x00007FFB284A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4500-10-0x00007FFB282B0000-0x00007FFB284A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4500-0-0x00007FFAE8330000-0x00007FFAE8340000-memory.dmp

    Filesize

    64KB

  • memory/4500-12-0x00007FFAE6090000-0x00007FFAE60A0000-memory.dmp

    Filesize

    64KB

  • memory/4500-4-0x00007FFB282B0000-0x00007FFB284A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4500-3-0x00007FFAE8330000-0x00007FFAE8340000-memory.dmp

    Filesize

    64KB

  • memory/4500-2-0x00007FFAE8330000-0x00007FFAE8340000-memory.dmp

    Filesize

    64KB

  • memory/4500-507-0x00007FFB282B0000-0x00007FFB284A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4500-517-0x00007FFB282B0000-0x00007FFB284A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4500-518-0x00007FFB282B0000-0x00007FFB284A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4500-1-0x00007FFB282B0000-0x00007FFB284A5000-memory.dmp

    Filesize

    2.0MB