Analysis

  • max time kernel
    589s
  • max time network
    600s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 18:16

General

  • Target

    KNV LA/License_TCH.rtf

  • Size

    86KB

  • MD5

    9e63d9ef2fffd5a757f3492552f6c2e6

  • SHA1

    e4bb626fe9fa76855e775da36f15d18590377c45

  • SHA256

    03339b0922b83bafda6af27eb76c6614a68c89e16029efb8a455c806dcc6fe5f

  • SHA512

    838408f8e550768ad5fef1c235fc7d69555e79f0e739b0c62eacd4385b920fb8f7ab87aadd625eb6468a9cdd2e8ec027a6142aea3364c5b8d58dd69807c580a8

  • SSDEEP

    1536:THjV6TkQnzb0tGQwFhjW31AoAW1tsVc/V7S+o8Zejq:PV6TkQnzb0tGQwFhjQ1AoAW1tsVc/V7V

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\KNV LA\License_TCH.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2792
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1392,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=4020 /prefetch:8
    1⤵
      PID:3392
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5028,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=1296 /prefetch:8
      1⤵
        PID:2872

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851227[[fn=sist02]].xsl

        Filesize

        245KB

        MD5

        f883b260a8d67082ea895c14bf56dd56

        SHA1

        7954565c1f243d46ad3b1e2f1baf3281451fc14b

        SHA256

        ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

        SHA512

        d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

      • memory/2792-12-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-536-0x00007FF929FB0000-0x00007FF929FC0000-memory.dmp

        Filesize

        64KB

      • memory/2792-3-0x00007FF929FB0000-0x00007FF929FC0000-memory.dmp

        Filesize

        64KB

      • memory/2792-1-0x00007FF929FB0000-0x00007FF929FC0000-memory.dmp

        Filesize

        64KB

      • memory/2792-5-0x00007FF969FCD000-0x00007FF969FCE000-memory.dmp

        Filesize

        4KB

      • memory/2792-7-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-6-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-9-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-8-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-11-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-10-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-0-0x00007FF929FB0000-0x00007FF929FC0000-memory.dmp

        Filesize

        64KB

      • memory/2792-4-0x00007FF929FB0000-0x00007FF929FC0000-memory.dmp

        Filesize

        64KB

      • memory/2792-17-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-14-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-15-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-13-0x00007FF927650000-0x00007FF927660000-memory.dmp

        Filesize

        64KB

      • memory/2792-18-0x00007FF927650000-0x00007FF927660000-memory.dmp

        Filesize

        64KB

      • memory/2792-2-0x00007FF929FB0000-0x00007FF929FC0000-memory.dmp

        Filesize

        64KB

      • memory/2792-512-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-535-0x00007FF929FB0000-0x00007FF929FC0000-memory.dmp

        Filesize

        64KB

      • memory/2792-16-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB

      • memory/2792-534-0x00007FF929FB0000-0x00007FF929FC0000-memory.dmp

        Filesize

        64KB

      • memory/2792-537-0x00007FF929FB0000-0x00007FF929FC0000-memory.dmp

        Filesize

        64KB

      • memory/2792-538-0x00007FF969F30000-0x00007FF96A125000-memory.dmp

        Filesize

        2.0MB