Analysis

  • max time kernel
    61s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 21:18

General

  • Target

    92073233ee5c64cca43853633950021459077cf4891a172c629d79f66ec9c891.docm

  • Size

    206KB

  • MD5

    8fdb689d70efaf7026986612283eb651

  • SHA1

    27332d4043f10744a86b023181e1e8cfa2b2f62a

  • SHA256

    92073233ee5c64cca43853633950021459077cf4891a172c629d79f66ec9c891

  • SHA512

    b782042ae737f7bc84cd834c41fc3480224eb16ca6900a8c1cbab61abc8c8b22e73e2267ba74f4fffd53558f325b908ff6ee7125b022032ef47f421773c511cc

  • SSDEEP

    6144:G/HHHRzJky3eEGVdajJ66tAhUJOO3NBfxsegI:GvnPkyuEGfMuhU7D5x

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\92073233ee5c64cca43853633950021459077cf4891a172c629d79f66ec9c891.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://employeeportal.net-login.com/XMWF3Q1dlRld3anZ3MHRCa3d2NjNlbUdhcFdrZ29oNDNnMWVFYmpQSkJETlN6YUo0SjNmc0RTS3FremVqQUFDRWUxeVhsMWk0cENOOGc2RUt3KzM3bVZJdk9oemtyNXF2ZXczRnJhMHNrZkdpT1pZUkV3NktJUmVNNS83Q0RhemNhdCsyZ3dDdU05ancwb2IwOFdyMUJ5dFdSakU5UU04OW91OUp5SkpGQWZwZlZ4bm1CUHNEVnRwZ2QvckRVNXRCVWJMaC0tNitsS3d4a3lGdnIvUnFZKy0tbEtuUnB5R0tJYnhjdTlPb2twck5hdz09?cid=2089134535
      2⤵
        PID:316
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=2596 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:1
      1⤵
        PID:1192
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4284 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:1
        1⤵
          PID:4456
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5868 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:4632
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5040 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:1
            1⤵
              PID:3428
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5524 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:1
              1⤵
                PID:4912
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5468 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:8
                1⤵
                  PID:3096

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/2112-0-0x00007FFC6CE30000-0x00007FFC6CE40000-memory.dmp

                  Filesize

                  64KB

                • memory/2112-1-0x00007FFC6CE30000-0x00007FFC6CE40000-memory.dmp

                  Filesize

                  64KB

                • memory/2112-2-0x00007FFC6CE30000-0x00007FFC6CE40000-memory.dmp

                  Filesize

                  64KB

                • memory/2112-3-0x00007FFCACE4D000-0x00007FFCACE4E000-memory.dmp

                  Filesize

                  4KB

                • memory/2112-4-0x00007FFC6CE30000-0x00007FFC6CE40000-memory.dmp

                  Filesize

                  64KB

                • memory/2112-5-0x00007FFCACDB0000-0x00007FFCACFA5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2112-7-0x00007FFCACDB0000-0x00007FFCACFA5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2112-6-0x00007FFC6CE30000-0x00007FFC6CE40000-memory.dmp

                  Filesize

                  64KB

                • memory/2112-8-0x00007FFCACDB0000-0x00007FFCACFA5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2112-9-0x00007FFC6A870000-0x00007FFC6A880000-memory.dmp

                  Filesize

                  64KB

                • memory/2112-11-0x00007FFC6A870000-0x00007FFC6A880000-memory.dmp

                  Filesize

                  64KB

                • memory/2112-29-0x00007FFCACDB0000-0x00007FFCACFA5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2112-37-0x00007FFCACDB0000-0x00007FFCACFA5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2112-41-0x00007FFCACDB0000-0x00007FFCACFA5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2112-45-0x00007FFCACDB0000-0x00007FFCACFA5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2112-48-0x00007FFCACDB0000-0x00007FFCACFA5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2112-49-0x00007FFCACDB0000-0x00007FFCACFA5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2112-50-0x00007FFCACDB0000-0x00007FFCACFA5000-memory.dmp

                  Filesize

                  2.0MB