Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2024 01:04

General

  • Target

    098bfe7ab9c2ca61fc488b0e9751adc098330485b49023852a3fcccace8a227f.rtf

  • Size

    87KB

  • MD5

    7d3b215b98532e8570e22f353da4223e

  • SHA1

    004b80efe852e998a9ec7c67cf524d5abb660d1c

  • SHA256

    098bfe7ab9c2ca61fc488b0e9751adc098330485b49023852a3fcccace8a227f

  • SHA512

    49f9ef28d030c16cf5035f4a9fadecb385e37603093b3d6c6a871b8dcab3f23ae068e1f19fd38b8a62946eaf77cff8fd8f428a73fb7e90f09b74a64a9d8f0f64

  • SSDEEP

    384:TyfLh3m+7oZ5xgLn4LwP/sluJJxoMTtPNmZYjCYnXPKl:2fLtm+I7AzD1mOCYnfKl

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\098bfe7ab9c2ca61fc488b0e9751adc098330485b49023852a3fcccace8a227f.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDFD5F.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    4KB

    MD5

    f21cfa0c908791dd541a36d54a719448

    SHA1

    762a9f2ec3494b6df67e4398e8f646a223d6e488

    SHA256

    071ef015e7ade9c9b9ca007c35e5aef530b27220ce28b4e70a44baf2257e4be5

    SHA512

    459bd71828da0363b7547309699f6af2384a6628c43fb643dd3b177b3259be45b3a2396ee69d1eff6c98440ce1f2b52af4a120b881195bb90b569e379e682457

  • memory/3092-8-0x00007FFCE57B0000-0x00007FFCE59A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3092-181-0x00007FFCA5830000-0x00007FFCA5840000-memory.dmp

    Filesize

    64KB

  • memory/3092-2-0x00007FFCA5830000-0x00007FFCA5840000-memory.dmp

    Filesize

    64KB

  • memory/3092-5-0x00007FFCE57B0000-0x00007FFCE59A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3092-4-0x00007FFCA5830000-0x00007FFCA5840000-memory.dmp

    Filesize

    64KB

  • memory/3092-9-0x00007FFCE57B0000-0x00007FFCE59A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3092-11-0x00007FFCE57B0000-0x00007FFCE59A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3092-12-0x00007FFCE57B0000-0x00007FFCE59A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3092-13-0x00007FFCA3240000-0x00007FFCA3250000-memory.dmp

    Filesize

    64KB

  • memory/3092-10-0x00007FFCE57B0000-0x00007FFCE59A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3092-182-0x00007FFCE57B0000-0x00007FFCE59A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3092-3-0x00007FFCA5830000-0x00007FFCA5840000-memory.dmp

    Filesize

    64KB

  • memory/3092-29-0x00007FFCE584D000-0x00007FFCE584E000-memory.dmp

    Filesize

    4KB

  • memory/3092-28-0x00007FFCE57B0000-0x00007FFCE59A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3092-14-0x00007FFCA3240000-0x00007FFCA3250000-memory.dmp

    Filesize

    64KB

  • memory/3092-30-0x00007FFCE57B0000-0x00007FFCE59A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3092-31-0x00007FFCE57B0000-0x00007FFCE59A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3092-6-0x00007FFCE57B0000-0x00007FFCE59A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3092-1-0x00007FFCA5830000-0x00007FFCA5840000-memory.dmp

    Filesize

    64KB

  • memory/3092-178-0x00007FFCA5830000-0x00007FFCA5840000-memory.dmp

    Filesize

    64KB

  • memory/3092-180-0x00007FFCA5830000-0x00007FFCA5840000-memory.dmp

    Filesize

    64KB

  • memory/3092-7-0x00007FFCA5830000-0x00007FFCA5840000-memory.dmp

    Filesize

    64KB

  • memory/3092-179-0x00007FFCA5830000-0x00007FFCA5840000-memory.dmp

    Filesize

    64KB

  • memory/3092-0-0x00007FFCE584D000-0x00007FFCE584E000-memory.dmp

    Filesize

    4KB