Analysis

  • max time kernel
    141s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 15:55

General

  • Target

    TRANSCEND-SM32X-PV1.0.68-BY-TAGARAZ-L0630/UFD_MP/FactoryDriver/Documents_for_SMI_Driver.doc

  • Size

    391KB

  • MD5

    69e50539ed3640a5233ad7963d83d779

  • SHA1

    beb2d2cf8fa91c9b1f3350ec11704f25b9182288

  • SHA256

    31ba4b475fbf247537245573f97e50ed946f57845282456c2fecdf94b0b73c48

  • SHA512

    bf92f44570051246045d81928a545f3ad0fe6bb4c6982674d853397d80773972c19ddb64c06ae1d36709d2411a0d528aaebb3bee51a32b4d6e75914c5c64b249

  • SSDEEP

    6144:MiVi+xZo/mAKBGLU9xYauC6p3qvte3Vm2mWQNgD1UsX+Sm8CA4ialo8Ij:MiViYZ0GQU967C6p3moVmJNLsX/PCAO

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\TRANSCEND-SM32X-PV1.0.68-BY-TAGARAZ-L0630\UFD_MP\FactoryDriver\Documents_for_SMI_Driver.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4324

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\1237C555.emf

          Filesize

          43KB

          MD5

          b389e725078091321136b913f85abb07

          SHA1

          2d56546a9229e211fea491940421b4ec3b166c7f

          SHA256

          919ed054c2e5fd156000afbde2007372aa3ec4f8c1a079efec44e9a7b1961df8

          SHA512

          7cf119af8b167c62818138dbae1193c5b2c45224eb5b3bf21ab7a8e9a61ec0fcdede81d1640ded299349cbb9dc0034e3690743cc352bc55faedaa7502c0ff824

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\323FB9A4.emf

          Filesize

          126KB

          MD5

          0a4fbcbca44f4b920de830ad3b59f4cb

          SHA1

          811145165d085b018cb481dfb6a54a346a26faca

          SHA256

          c14aeb882f9e150d3a4a6869a4daaf0494e821445dab5b8d709b8bc850134d8c

          SHA512

          dc21c4531d078a97e0a5e409d9a55fcff424e19d5fa0a56a977a24d1337ac88235a378629a2bdd1e3d7d56b338fd3ca1fa7e11dd1c2ef9a1ca448e2292fa0cde

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\3FB9EF30.emf

          Filesize

          373KB

          MD5

          56d53402cbfc21804549678513669813

          SHA1

          e7f63b8ae72b80dfa6e164d5b97c90c2d2edfc40

          SHA256

          334e4ce90f830d859f61be88d1ebd1c80dd6fc30d783e9fb50d1c98486eca023

          SHA512

          c0f50182d1b9b507ae5675d6112bf2013b6dab53e032468955133c6b27ea9ce9673c031200dcb477ed936b9672a4357f88d63fc0962329faffd8afea0fe630ae

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\498BC5E3.emf

          Filesize

          528KB

          MD5

          116bbbf0e807ebd965c6cd42430f8729

          SHA1

          fdef9a51d6689f3485617173ef87846c83194b71

          SHA256

          3f9770b1c31cb1320f397fa876c4b6834514907496d7d83ecd1ed8247202c5ec

          SHA512

          d2251b603d318629b56c1eca4edd054ba0098eabb5f6149109490eda4df6045d9ec2e83291e9ccf7462f429eb83ca1e02db81e6c2ae7a8786781e350b2a01803

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\4E22194D.emf

          Filesize

          65KB

          MD5

          683527bb1766a155c972cf68e2ca39f5

          SHA1

          b27c5f69d908bedbc6718327c1610927b8ac4a6a

          SHA256

          6e303f052368fd5cad92212f4ac5d484e20290de2c4c2e0881a24f9db6535b90

          SHA512

          91eba018cb92999dc3d02e4a07864e2a9c7e69ed4a8af133edc58a78bc8e5bdd730bd1ff90b4ea496cc4f63ff83f143fdcea69fa8006fd505ad50ee8efd33833

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\636F977C.emf

          Filesize

          189KB

          MD5

          ef6436d61458cf2e9ebc3e1f9f9b90bc

          SHA1

          d8aa820c992890f76438dbdeb90055fafa74878c

          SHA256

          efdf341d96739298865e366e3afc7e81026f96d81cfaba52d6e4962209ed2f83

          SHA512

          6797af1f6dc919d10433dc7b23c7d952c31bd934c25a7f65833ed8783d3df248302f820fc0576e774dc69869d0b788cbcfdaf896f12e66477dc770ac3f257663

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\654F6EA.emf

          Filesize

          852KB

          MD5

          b72f8d74959f12d3da5a99b301795b99

          SHA1

          ba11873c3a93db6f2249aa6aa542dfb805ba43d2

          SHA256

          c432e639b3aec98ad11505892239365d27a5913377f1c2d7862d004906091326

          SHA512

          a836cddd94abacf0f7ea66b013072de77b3601131ad216ebc8c7f59a728f5075fb54a6bbd427eee8874c0913552d64c2989970797097f1abdad871c86ab17f22

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\6AC1E352.emf

          Filesize

          382KB

          MD5

          64522a8b7062ebf6f01ff1bdb1306921

          SHA1

          b3184a85d7c7f8bfe8eac8a11fe7b8b2fbd9a9c3

          SHA256

          bc1c7d9380e168fd5e5b3513cb7787813276f7e97fb6f70b1b8a405c1f4d94cb

          SHA512

          5a2f221c26ddee543d189a01f9b25e0be8175326e3396555e9ae88bfb1d23abff458fcfb27415966adc8a5954b73288bce8875eb6b44a1af3c8d872874b386bd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\7691D9A7.emf

          Filesize

          374KB

          MD5

          4f25f5728e0e92114d60503aa065afda

          SHA1

          58ab5a2500e29c808184ad021b555bc5847135b9

          SHA256

          b9693715c5f3b9998e46f5ffe58721871785066b327b2270cdface6c657735ce

          SHA512

          a54170b1f1893dad0633bc04720841457f49c6f22ca5191ebdf79b0f56f1cc3835e3e4cd4f571709bf2b4401bad89c79d31966b070f2151969819b6ebe643ed9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\77249CE9.emf

          Filesize

          118KB

          MD5

          74ae5b87445017eabf973cfd6fb5b0f8

          SHA1

          723f431d5957a8be4f171524832d3c7f36c9abe2

          SHA256

          3cfd2b7a2856ca014cfdd3983032045fb2c5d98eec607f19c6bfad0c5f2fd1dc

          SHA512

          dcc02de339abd9cb4446267631da33b4e0c8bd8c689874cdfd9030e4db440b74a9e28d3aaac1678168799d3597cd74c9dd3ff8e0900bca2a682b9be8bfe8d53d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\864D8CBE.emf

          Filesize

          242KB

          MD5

          ed0b464e5475e7b4a6b990b3b476167e

          SHA1

          893592967324ae2f4c2ca6b3872d5956bfd0b22a

          SHA256

          feb25705caaf742c0db937c97850d599ecffb5b94cf228d425743a40e4b0a034

          SHA512

          c68547c5e3d4fbce68eef8388013483103977998fdf2fac4e32a00edae5a60e79f62e733e9710f4961edba1ec9d3e9e326b818184392706d35bb219f6d48447c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\AD6E4571.emf

          Filesize

          376KB

          MD5

          045de414bc8a7a8035aefdb1a1f83eb8

          SHA1

          e20e9ca75290a52cd1756b5b60afa1128ddf53ab

          SHA256

          c45a1298fda31cbc63a704fe2c67571c95beee4c8925a8426bb7f379576519aa

          SHA512

          96e6da489776a44db97035a6053909ea365d12efabdecf358c798d340ac2a64ffd8328da6a523ee4dcb62c2cf1e6e19ce1ffd8da131941b6dcc5415956452d9b

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BB79E26F.emf

          Filesize

          118KB

          MD5

          a3bf943985b170efb31b7410ed68cb39

          SHA1

          c28065a2769013c28b194a36903e762540703ad1

          SHA256

          1e7850a2b7b86dd9c50c04daea037fab05d0d4ab69edddc3452631559b2664db

          SHA512

          550a881854b53df3eaa18fdd9c505089e0c95ccdee0777f2a5138e3adccfb6e1bbab7f74421991528379bec07ae5a7c04c6a370fea632c0bcc290a17d92daa28

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\C01C7E88.emf

          Filesize

          863KB

          MD5

          a5a683f323493b6aeaa38386786c7ecd

          SHA1

          0a8882093a714fb78bb4f85c6589cc76d9e002f5

          SHA256

          ce6f228c79dfae00da97ae2cc11550675b68b3b69c797f3809afe2afa592c528

          SHA512

          3839d09cbf964966cdd1ad11fcb5e92cfc01177592ea412b3e803cd0aacac207eb6f0a06a70743b8b31c8b0fb5847f01b5dc34356c00e1ea889c3fe11d087f08

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\DF6D372B.emf

          Filesize

          381KB

          MD5

          ae2fcb865bbe42d9b2e673dfacf5542a

          SHA1

          e6ee1bcbaa71c36cb85d26512c9147d532e3cf17

          SHA256

          f77dd0cd19db091aa3d8082fa899c67f2c5fdbe46ac5a09a93128edb3bc808d3

          SHA512

          a8bf6f277e063039c10df0bdf9563205d08f38039ec1b2964dddcaf5e3d092142b5ce0ef9d9b88ae6cb8735be1a3a4e2ee1f8d2553ff184ad8bae12e46ad17b2

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\F621CDD6.emf

          Filesize

          124KB

          MD5

          ec8ca3a286271a1e81feb62864663ea7

          SHA1

          d66be03227b4542f958bd0ea642b507c0cc6c048

          SHA256

          4f7ddf09c6c0df3d3393164f926f33049f0d1a2e333bfdeafd5f5761b2934567

          SHA512

          cb187c4a94a8f8610c0584af598083278eaa6e1c269cdf075fcd088baf41c9a17fc85eb8c9708a5e0b324a8f9ef33c8d029ef45288b0003d463f0fe4d01759de

        • C:\Users\Admin\AppData\Local\Temp\TCD9A9A.tmp\gb.xsl

          Filesize

          262KB

          MD5

          51d32ee5bc7ab811041f799652d26e04

          SHA1

          412193006aa3ef19e0a57e16acf86b830993024a

          SHA256

          6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

          SHA512

          5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • memory/4324-17-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-3-0x00007FFED6CD0000-0x00007FFED6CE0000-memory.dmp

          Filesize

          64KB

        • memory/4324-18-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-8-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-0-0x00007FFED6CD0000-0x00007FFED6CE0000-memory.dmp

          Filesize

          64KB

        • memory/4324-12-0x00007FFED4BE0000-0x00007FFED4BF0000-memory.dmp

          Filesize

          64KB

        • memory/4324-13-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-9-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-21-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-11-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-10-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-7-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-6-0x00007FFED6CD0000-0x00007FFED6CE0000-memory.dmp

          Filesize

          64KB

        • memory/4324-20-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-5-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-4-0x00007FFF16CED000-0x00007FFF16CEE000-memory.dmp

          Filesize

          4KB

        • memory/4324-1-0x00007FFED6CD0000-0x00007FFED6CE0000-memory.dmp

          Filesize

          64KB

        • memory/4324-19-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-2-0x00007FFED6CD0000-0x00007FFED6CE0000-memory.dmp

          Filesize

          64KB

        • memory/4324-16-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-15-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-14-0x00007FFED4BE0000-0x00007FFED4BF0000-memory.dmp

          Filesize

          64KB

        • memory/4324-668-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB

        • memory/4324-723-0x00007FFED6CD0000-0x00007FFED6CE0000-memory.dmp

          Filesize

          64KB

        • memory/4324-724-0x00007FFED6CD0000-0x00007FFED6CE0000-memory.dmp

          Filesize

          64KB

        • memory/4324-722-0x00007FFED6CD0000-0x00007FFED6CE0000-memory.dmp

          Filesize

          64KB

        • memory/4324-725-0x00007FFED6CD0000-0x00007FFED6CE0000-memory.dmp

          Filesize

          64KB

        • memory/4324-726-0x00007FFF16C50000-0x00007FFF16E45000-memory.dmp

          Filesize

          2.0MB