Analysis
-
max time kernel
149s -
max time network
273s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
PROMSVYAZBANK REQUREMENTS TO LEGAL OPINION.docx
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Scope_India.docx
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
email-html-1.html
Resource
win10v2004-20240426-en
General
-
Target
Scope_India.docx
-
Size
23KB
-
MD5
c4c31c8916db99d8140125a7f40083e2
-
SHA1
bb4c320ddd64c49215a2b3e322f6d829f218fd19
-
SHA256
6638f998c53d1ffa67080efc1ee097a5eeaca20855954b3b8ebcdd0811b0d947
-
SHA512
28166dd35fb32e1b69d224d4412f298515a7f504d353fd8963af12f1abf8b9d6b2167458c7194dc14e58de9561de61fb256ee599008918837889e2a0cd824fd3
-
SSDEEP
384:hzAuyaAVBwsmw9FhQdwQIQybq9yZcTswRN8W9+8d3fSBi1/uAJ+7wQxk1x9led7Q:FAuyaAVBwsmw9FmoZeswRN1g8d3aBu/N
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3988 WINWORD.EXE 3988 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Scope_India.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810