Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-05-2024 10:01

General

  • Target

    $TEMP/zapros.docx

  • Size

    11KB

  • MD5

    9871272af8b06b484f0529c10350a910

  • SHA1

    707979b027f371989fb71e36795b652a2d466592

  • SHA256

    c2a256547433bec8d7afbed923f453eb2df978f18ed498e82bb2b244b126a9f3

  • SHA512

    5bd60de706ed3ef717177b08fa69ebc8117fe52bf53e896b91d102430b4b976b136f2df75fe4d1cb9cf16f5e73052e030e364bdf212148b1471e9c2b99f76a4c

  • SSDEEP

    192:CtNCOdi9y6MGLnTCXK8b5o5psQrW8t6I6YjyodJYUeUgPm6E9S7P:aN9di9SQCXK3gQa8QI6gldSUezPmzAP

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$TEMP\zapros.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3080
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\TCDB568.tmp\sist02.xsl

      Filesize

      245KB

      MD5

      f883b260a8d67082ea895c14bf56dd56

      SHA1

      7954565c1f243d46ad3b1e2f1baf3281451fc14b

      SHA256

      ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

      SHA512

      d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

    • memory/3080-11-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-3-0x00007FFA4A8D5000-0x00007FFA4A8D6000-memory.dmp

      Filesize

      4KB

    • memory/3080-19-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-24-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-5-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-8-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-10-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-9-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-0-0x00007FFA0A8C0000-0x00007FFA0A8D0000-memory.dmp

      Filesize

      64KB

    • memory/3080-12-0x00007FFA06EC0000-0x00007FFA06ED0000-memory.dmp

      Filesize

      64KB

    • memory/3080-13-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-14-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-15-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-18-0x00007FFA06EC0000-0x00007FFA06ED0000-memory.dmp

      Filesize

      64KB

    • memory/3080-17-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-16-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-4-0x00007FFA0A8C0000-0x00007FFA0A8D0000-memory.dmp

      Filesize

      64KB

    • memory/3080-26-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-2-0x00007FFA0A8C0000-0x00007FFA0A8D0000-memory.dmp

      Filesize

      64KB

    • memory/3080-25-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-29-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-32-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-31-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-30-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-28-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-27-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-1-0x00007FFA0A8C0000-0x00007FFA0A8D0000-memory.dmp

      Filesize

      64KB

    • memory/3080-645-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-673-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-674-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-745-0x00007FFA0A8C0000-0x00007FFA0A8D0000-memory.dmp

      Filesize

      64KB

    • memory/3080-746-0x00007FFA0A8C0000-0x00007FFA0A8D0000-memory.dmp

      Filesize

      64KB

    • memory/3080-748-0x00007FFA0A8C0000-0x00007FFA0A8D0000-memory.dmp

      Filesize

      64KB

    • memory/3080-747-0x00007FFA0A8C0000-0x00007FFA0A8D0000-memory.dmp

      Filesize

      64KB

    • memory/3080-749-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB

    • memory/3080-750-0x00007FFA4A830000-0x00007FFA4AA0B000-memory.dmp

      Filesize

      1.9MB