Analysis
-
max time kernel
201s -
max time network
203s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/07/2024, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
Quarantined Messages (3).zip
Resource
win11-20240704-en
Behavioral task
behavioral2
Sample
0e943a5a-172f-4a96-1f71-08dc9f80637b/9d8fd958-4f1d-406c-ba8d-74ee036b28c3.eml
Resource
win11-20240704-en
Behavioral task
behavioral3
Sample
IQHM.png
Resource
win11-20240704-en
Behavioral task
behavioral5
Sample
email-html-2.txt
Resource
win11-20240704-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win11-20240704-en
General
-
Target
[email protected]_benefits_8nmxt2.docx
-
Size
34KB
-
MD5
64a4f3913c42dd3ee6b2bb21f0cb7f93
-
SHA1
3bc963e9489bee256363bc3cb01597f89d50d4a2
-
SHA256
0d527c3e578752f9bb9859b6adef6022e090b35aaae61d2d904b6f9bf61b7d7c
-
SHA512
76ceee3d6cd1817bfb9aab77572a84e0221c5fb79657332f9e0d52ae14fb55a89228670398b111f7d76ecad198f4d1f3a1d127294b93e189c3809e2119fa59d1
-
SSDEEP
768:5wjGlnKFk8j2lvYehAUe87WyZsXPAIINEYfQXQURBtDZE34:5Ddn8OYeeZ4mffImR1ZZEI
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2476 WINWORD.EXE 2476 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE 2476 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\[email protected]_benefits_8nmxt2.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d