Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 01:13

General

  • Target

    bf0fb9348736b302afeb9167c53d54f437963fe3024acd86673c8175b4ec16cc.docx

  • Size

    328KB

  • MD5

    4df8ff3f5542b0223e9f9a4a01a37de4

  • SHA1

    c63c15b9aceb05fad38a6c527b444ff826985db0

  • SHA256

    bf0fb9348736b302afeb9167c53d54f437963fe3024acd86673c8175b4ec16cc

  • SHA512

    209d7b4bd834f872f8b561b2ef78d3a9613edf84e6ec2d69a906f6e18a1cbc4b2ec85fe65031e6a8b78476153ba5b94d5f7b61c2b2d9f5b4e5ad83b687de17e2

  • SSDEEP

    6144:W7b/w8Ms6S63XPngy+pGLCJXm+Ajs5fg8cNViXqcki3REXh/:yT2t3XGysjrg8IPwREx/

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bf0fb9348736b302afeb9167c53d54f437963fe3024acd86673c8175b4ec16cc.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\DEC6ECB5.emf

    Filesize

    5.7MB

    MD5

    a5b49a08477684f50f5e2a45c11e5ae8

    SHA1

    21b389940753a91eb6b1fbd6f0e96d44743f30de

    SHA256

    ccf24cec0594d4cf3f87df4fc8a87192e2a9dbd965be8ca92e50005ffd83d137

    SHA512

    56f0b935b9dbafe3fa845403ea8eedf65af1707892a5d79c6d5b7d7406045b442dbbbcae477998e1f8669fb80c6f97f8f0df6ee054a0e2136a2bea49d1bbe05c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9JI1NA5J\we.we.we.we.wewewewe[1].doc

    Filesize

    113KB

    MD5

    6f2f933c81549f01eb55e42a0d85535e

    SHA1

    f5212e43164146c5015f2091f3f0e69be9909028

    SHA256

    965c26393e3b278c346831c9efc6c344386d1e06fc4f1921c7ce67b0cf0e4a36

    SHA512

    1fc8f12c3497a2010dc5d2657fa2ec250d900e05b2381b8ea3aa0382a482013b0cb8ad1f181c793a78aabc59da19032f13fbdb272b36fec7af38a682fa18faca

  • C:\Users\Admin\AppData\Local\Temp\TCD4626.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    319B

    MD5

    5634e4fe00cbf90792779265b17eea57

    SHA1

    e33950140bb9173a297cde88802ec28d21cb64fb

    SHA256

    b075567005fb1cf4edefd3f5f99263f281d377fad8229cd4bbe209083055c354

    SHA512

    2d989bfdda8ad841168e6a4b0d701c0a95ae55df8fecc68a5b61afd982c12465dd2e760db2fbf18197ef25ba5419942ba43511cb03c4e37561219a64c42765ca

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    5e2a3b3a57a3f79e717603a1384780b1

    SHA1

    cff143c10f4453dcc4d23cb685e39929692b7975

    SHA256

    1ae3614fbc1b5bf167fc3ac1deaaa8910d8d0e8fbb2505f0c36511f3d642bcf7

    SHA512

    1e06c97d252d0da4d2dc9c1cf9566abea01756b2806666dfcd3de18786de93f7d9ee22a0d097592d71c30e725a865f344a4f05257202babf7d41e7f6befa9475

  • memory/1508-17-0x00007FFA0B1F0000-0x00007FFA0B200000-memory.dmp

    Filesize

    64KB

  • memory/1508-2-0x00007FFA0D570000-0x00007FFA0D580000-memory.dmp

    Filesize

    64KB

  • memory/1508-10-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-11-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-13-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-14-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-15-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-16-0x00007FFA0B1F0000-0x00007FFA0B200000-memory.dmp

    Filesize

    64KB

  • memory/1508-12-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-9-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-8-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-1-0x00007FFA4D58D000-0x00007FFA4D58E000-memory.dmp

    Filesize

    4KB

  • memory/1508-7-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-6-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-3-0x00007FFA0D570000-0x00007FFA0D580000-memory.dmp

    Filesize

    64KB

  • memory/1508-5-0x00007FFA0D570000-0x00007FFA0D580000-memory.dmp

    Filesize

    64KB

  • memory/1508-4-0x00007FFA0D570000-0x00007FFA0D580000-memory.dmp

    Filesize

    64KB

  • memory/1508-118-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-119-0x00007FFA4D58D000-0x00007FFA4D58E000-memory.dmp

    Filesize

    4KB

  • memory/1508-120-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-121-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1508-0-0x00007FFA0D570000-0x00007FFA0D580000-memory.dmp

    Filesize

    64KB

  • memory/1508-271-0x00007FFA0D570000-0x00007FFA0D580000-memory.dmp

    Filesize

    64KB

  • memory/1508-269-0x00007FFA0D570000-0x00007FFA0D580000-memory.dmp

    Filesize

    64KB

  • memory/1508-270-0x00007FFA0D570000-0x00007FFA0D580000-memory.dmp

    Filesize

    64KB

  • memory/1508-268-0x00007FFA0D570000-0x00007FFA0D580000-memory.dmp

    Filesize

    64KB

  • memory/1508-272-0x00007FFA4D4F0000-0x00007FFA4D6E5000-memory.dmp

    Filesize

    2.0MB