Analysis

  • max time kernel
    101s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 10:09

General

  • Target

    RFQ, SPECIFICHE E DISEGNI.docx

  • Size

    89KB

  • MD5

    678a5620c1a6144e6572baf64065c3ef

  • SHA1

    8485b42751328b5aa0bbc88b01600e8f17cebbcd

  • SHA256

    0efbc73c4e417d1153c08bdf7e101ee744a3f34c8241b073c2e0dfe34cd6139a

  • SHA512

    53fb3a8029e9ad7f8e4f4b2861b856563fbef62c7339a73c868a8c986cb27ab75ee528b1c4fa4c9007c031676a07946ee0263d56aa106de86790e7b1d2139a2f

  • SSDEEP

    1536:CH3mtb7ih7kPw17kG1Nc2FjOppKdA6KJvarn82+C4kAh6rhFRmxN/Sh+e:CHWt3ixkw17kcrOppKdsvarh4h69vmHu

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RFQ, SPECIFICHE E DISEGNI.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\6441F4DF.emf

    Filesize

    78KB

    MD5

    97f3291db00b29c1537f6faabfcf8983

    SHA1

    38ac80147123d212b5923160c7f29b93c25e885c

    SHA256

    6f6e805c9473d6b4c0aec3b082cbc7e782b6c56a4d0048ef5902bb3ed8a8965c

    SHA512

    ec3ccb5b3ab053968fa47048f6915de82e85bf1a4313eb479d34a9dbf4cd20ea059553c5f7407f8710da642f01356bc86411a10809575b286f43969d49a6cad0

  • C:\Users\Admin\AppData\Local\Temp\TCDF1BA.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    2KB

    MD5

    36ce40756202c8df2a52f3eec7e62274

    SHA1

    b9f7c7145389ced0cb1aaee38b32e3ff74c96019

    SHA256

    9b8050ac504891a922d86af567a38809772ac35c5119d90442b0781f84934065

    SHA512

    dc22a31d904e0885eed6c708f8f8c5abcf95cc9ad101da17a6573f05f199d10326458f5446a7250569763285ba9e8904d53ac96399653ff7ddc250147920c601

  • memory/116-21-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-6-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-5-0x00007FFD168D0000-0x00007FFD168E0000-memory.dmp

    Filesize

    64KB

  • memory/116-12-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-11-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-10-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-13-0x00007FFD144F0000-0x00007FFD14500000-memory.dmp

    Filesize

    64KB

  • memory/116-9-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-8-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-14-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-15-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-18-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-22-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-0-0x00007FFD168D0000-0x00007FFD168E0000-memory.dmp

    Filesize

    64KB

  • memory/116-4-0x00007FFD168D0000-0x00007FFD168E0000-memory.dmp

    Filesize

    64KB

  • memory/116-17-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-20-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-16-0x00007FFD144F0000-0x00007FFD14500000-memory.dmp

    Filesize

    64KB

  • memory/116-7-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-19-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-2-0x00007FFD168D0000-0x00007FFD168E0000-memory.dmp

    Filesize

    64KB

  • memory/116-68-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB

  • memory/116-3-0x00007FFD568ED000-0x00007FFD568EE000-memory.dmp

    Filesize

    4KB

  • memory/116-1-0x00007FFD168D0000-0x00007FFD168E0000-memory.dmp

    Filesize

    64KB

  • memory/116-218-0x00007FFD168D0000-0x00007FFD168E0000-memory.dmp

    Filesize

    64KB

  • memory/116-217-0x00007FFD168D0000-0x00007FFD168E0000-memory.dmp

    Filesize

    64KB

  • memory/116-220-0x00007FFD168D0000-0x00007FFD168E0000-memory.dmp

    Filesize

    64KB

  • memory/116-219-0x00007FFD168D0000-0x00007FFD168E0000-memory.dmp

    Filesize

    64KB

  • memory/116-221-0x00007FFD56850000-0x00007FFD56A45000-memory.dmp

    Filesize

    2.0MB