Analysis Overview
SHA256
f3c9ef7d1ea6177207e967c30d4cf44f13724bd91d26778875ac122d39fb5be5
Threat Level: Likely benign
The file 072024-16062-01.rar was found to be: Likely benign.
Malicious Activity Summary
Enumerates physical storage devices
Checks processor information in registry
Enumerates system info in registry
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-07 17:22
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-07 17:22
Reported
2024-08-07 17:23
Platform
win11-20240802-en
Max time kernel
29s
Max time network
26s
Command Line
Signatures
Enumerates physical storage devices
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\root\Office16\Winword.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\root\Office16\Winword.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\root\Office16\Winword.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\root\Office16\Winword.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\root\Office16\Winword.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\root\Office16\Winword.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings | C:\Windows\system32\cmd.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\root\Office16\Winword.exe | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\root\Office16\Winword.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 836 wrote to memory of 4772 | N/A | C:\Windows\system32\OpenWith.exe | C:\Program Files\Microsoft Office\root\Office16\Winword.exe |
| PID 836 wrote to memory of 4772 | N/A | C:\Windows\system32\OpenWith.exe | C:\Program Files\Microsoft Office\root\Office16\Winword.exe |
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\072024-16062-01.dmp
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Program Files\Microsoft Office\root\Office16\Winword.exe
"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\AppData\Local\Temp\072024-16062-01.dmp"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 18.89.109.52.in-addr.arpa | udp |
| NL | 104.110.240.42:443 | metadata.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
| GB | 2.18.190.133:443 | binaries.templates.cdn.office.net | tcp |
Files
memory/4772-4-0x00007FF85AB70000-0x00007FF85AB80000-memory.dmp
memory/4772-3-0x00007FF85AB70000-0x00007FF85AB80000-memory.dmp
memory/4772-2-0x00007FF85AB70000-0x00007FF85AB80000-memory.dmp
memory/4772-1-0x00007FF85AB70000-0x00007FF85AB80000-memory.dmp
memory/4772-0-0x00007FF85AB70000-0x00007FF85AB80000-memory.dmp
memory/4772-5-0x00007FF858770000-0x00007FF858780000-memory.dmp
memory/4772-6-0x00007FF858770000-0x00007FF858780000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\TCDE94F.tmp\gb.xsl
| MD5 | 51d32ee5bc7ab811041f799652d26e04 |
| SHA1 | 412193006aa3ef19e0a57e16acf86b830993024a |
| SHA256 | 6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97 |
| SHA512 | 5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810 |