Analysis

  • max time kernel
    144s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-08-2024 15:18

General

  • Target

    PRICE REQUEST RSM PQ24.docx

  • Size

    179KB

  • MD5

    dddc62fe7387455520e9eb696b4292fd

  • SHA1

    88f4353640f565178c8e4986d8cea7a03b1d14c4

  • SHA256

    2819ddc5b45aec8e553a8ba973a5e555d733dc45f38d3566dc2f0d1e7761ac32

  • SHA512

    e7334d487cd7137a1af8880c31086a9bb59b445ccd91346bc005ce7a5bd0026ab9a2854977463662eab7a148963376245b2917373a890a09ae5898999ebd1661

  • SSDEEP

    3072:aiY5rj1ATug+mhTZMxjcFQ9csn4qAzYjDp/shKuikycBSRjR/Vx7XUwV5h:w5r/g+qZMpcFSQzYHut4dNHh

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PRICE REQUEST RSM PQ24.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\O8WYVOD7\thrylPXnvfySmGN[1].doc

    Filesize

    766KB

    MD5

    c0d48716ea8eef0d46d77cc231fa5371

    SHA1

    1438d2234f6a36f27aa9b0c2465e71fd607a26c3

    SHA256

    6c98f35634c02c4cc1d7cbc628ba843c85e80559c1b1d51d44efb3e3bbfc40f6

    SHA512

    3fecda49692f47df4b3971d505b4a0920c6cff73433656e25144e87755b48f68d5b56aa087a1df204b46c1e8b312d580aef453cb3815377030e788047299e73b

  • C:\Users\Admin\AppData\Local\Temp\TCDB0F2.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    427B

    MD5

    8fb7140d595a1e6beb1f4bd8c59c8e11

    SHA1

    dbe4950e72dbc7f92d95dcc1b08482628a0a1bde

    SHA256

    024dac2859eb3073122375f38d150eb1b242968234ad2a32ae552eda3f51866f

    SHA512

    a8d7dabb815ba60844add27cdbebeea99f4e6e1d4d8d625b13830a10012f1cd830078a04836c334e81f00de49fddff70d8a9730dc029735d84e4953b7fb0ec22

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    025b2d210c7c73f604018c1dc9f6c0fa

    SHA1

    8aaecd04c2844f01c71c293414c018a1807c2ff0

    SHA256

    d2be64ba5d8196640c7eba4dd5f81ed936ab78581e3c8109be5033a02e821e61

    SHA512

    9a32a79268b172379fa9e827dbebbbd1873907f4917e157ff312c996618b4b7ea2bf6a6b126a47175284aa37135a98ec5661bdc9cde205d9ac0f54598fd65592

  • memory/1612-11-0x00007FFD669E0000-0x00007FFD669F0000-memory.dmp

    Filesize

    64KB

  • memory/1612-18-0x00007FFD669E0000-0x00007FFD669F0000-memory.dmp

    Filesize

    64KB

  • memory/1612-10-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-1-0x00007FFDA930D000-0x00007FFDA930E000-memory.dmp

    Filesize

    4KB

  • memory/1612-12-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-13-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-16-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-17-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-15-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-14-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-9-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-8-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-4-0x00007FFD692F0000-0x00007FFD69300000-memory.dmp

    Filesize

    64KB

  • memory/1612-7-0x00007FFD692F0000-0x00007FFD69300000-memory.dmp

    Filesize

    64KB

  • memory/1612-41-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-42-0x00007FFDA930D000-0x00007FFDA930E000-memory.dmp

    Filesize

    4KB

  • memory/1612-43-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-6-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-5-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB

  • memory/1612-2-0x00007FFD692F0000-0x00007FFD69300000-memory.dmp

    Filesize

    64KB

  • memory/1612-3-0x00007FFD692F0000-0x00007FFD69300000-memory.dmp

    Filesize

    64KB

  • memory/1612-0-0x00007FFD692F0000-0x00007FFD69300000-memory.dmp

    Filesize

    64KB

  • memory/1612-335-0x00007FFD692F0000-0x00007FFD69300000-memory.dmp

    Filesize

    64KB

  • memory/1612-334-0x00007FFD692F0000-0x00007FFD69300000-memory.dmp

    Filesize

    64KB

  • memory/1612-337-0x00007FFD692F0000-0x00007FFD69300000-memory.dmp

    Filesize

    64KB

  • memory/1612-336-0x00007FFD692F0000-0x00007FFD69300000-memory.dmp

    Filesize

    64KB

  • memory/1612-338-0x00007FFDA9270000-0x00007FFDA9465000-memory.dmp

    Filesize

    2.0MB