Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 05:54

General

  • Target

    opt/NetworkSecurityManager/Solr/server/solr/appAlerts/data/index/_9ee_Lucene50_0.doc

  • Size

    400B

  • MD5

    56909e8ce87d2c141fb73eb1bb1eda03

  • SHA1

    d8b8b7c967f6d5637493348adb94861455798af0

  • SHA256

    22b12f3c4b683c0630385811ca0140e380625e59573dfd2250b0c7d53761a94f

  • SHA512

    f3e2bfd148fe8b1c82b380c7a7bd25a8937fcbb09c555c598dbc049489b48a3768bba360d68869ea07f13a4205e8ae2a65206e8d89343aeba0d999c19a6f76c7

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\opt\NetworkSecurityManager\Solr\server\solr\appAlerts\data\index\_9ee_Lucene50_0.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4524

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4524-0-0x00007FFD952B0000-0x00007FFD952C0000-memory.dmp

          Filesize

          64KB

        • memory/4524-5-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-4-0x00007FFD952B0000-0x00007FFD952C0000-memory.dmp

          Filesize

          64KB

        • memory/4524-7-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-9-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-8-0x00007FFD952B0000-0x00007FFD952C0000-memory.dmp

          Filesize

          64KB

        • memory/4524-6-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-2-0x00007FFD952B0000-0x00007FFD952C0000-memory.dmp

          Filesize

          64KB

        • memory/4524-1-0x00007FFD952B0000-0x00007FFD952C0000-memory.dmp

          Filesize

          64KB

        • memory/4524-3-0x00007FFDD52CD000-0x00007FFDD52CE000-memory.dmp

          Filesize

          4KB

        • memory/4524-10-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-11-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-12-0x00007FFD93150000-0x00007FFD93160000-memory.dmp

          Filesize

          64KB

        • memory/4524-13-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-14-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-15-0x00007FFD93150000-0x00007FFD93160000-memory.dmp

          Filesize

          64KB

        • memory/4524-17-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-16-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-19-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-18-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB

        • memory/4524-34-0x00007FFDD5230000-0x00007FFDD5425000-memory.dmp

          Filesize

          2.0MB