Analysis

  • max time kernel
    101s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 02:41

General

  • Target

    6c055a021e4446a6d4f3c25690988c10N.docm

  • Size

    513KB

  • MD5

    6c055a021e4446a6d4f3c25690988c10

  • SHA1

    81661d0510c4b8a4a5c9bf7955c8cd4ed891c1b1

  • SHA256

    956bd5ac5746f4e92c9ae97c77e714188ebfb49e7552113dafe871e62853860e

  • SHA512

    06ce4de973c7baeb53f27a9b2965f24bf8d49a216c8449d8d66d62c2d54d386e74d974adeab773d36d817bf6fe56ea5e67d66cbbdaf1b157c6522f399efc1c6e

  • SSDEEP

    12288:bHAE+gcDDzlWnnqIDmaFMUA7VwnNwcDETWEfD6l/JuJwBpf9:bHAZ7z6nqOwUA7Vwn3DETWCwuqX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6c055a021e4446a6d4f3c25690988c10N.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\radA62A8.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\radA62A8.tmp.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:32

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\radA62A8.tmp.exe

    Filesize

    72KB

    MD5

    6ba5f5202585682d55bbed282f3f367b

    SHA1

    d8406910a24f29fe9ead50a53ae9367952efccf4

    SHA256

    7ea6d252b83e03e7daa08d7d419a18f47b617504d4b50cd9a06cc531789a0e7b

    SHA512

    d739b56c3d53c58eb63ac1a600eda41571a0dd4522a598ea7a10f4e1966cb720d61a221de4d5857b1cfc1db71e524b48a8190cd80237ca0060094f64be326ac2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851227[[fn=sist02]].xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

    Filesize

    18KB

    MD5

    22e8edce54ef16de0753c745d1c3e280

    SHA1

    0fc64ca8917f445f43c7a5c9feb83393cc3db24e

    SHA256

    a7de8a97cfff1d33ead035ca0a11926f1e7b3214aa94df34d88c18b4f9d78a85

    SHA512

    b7d7870acbb7985f6a608c8214a76699fac4c2acdcc9a86ad41c643a0cc2d8bbbdc167e79f1ebf5d090e81b7cc51ee3e2a01d0303278aac4a4b9d499edf8f270

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/32-92-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/32-63-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-44-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-5-0x00007FF7DDF50000-0x00007FF7DDF60000-memory.dmp

    Filesize

    64KB

  • memory/2296-8-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-10-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-9-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-11-0x00007FF7DB8F0000-0x00007FF7DB900000-memory.dmp

    Filesize

    64KB

  • memory/2296-12-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-13-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-15-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-16-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-14-0x00007FF7DB8F0000-0x00007FF7DB900000-memory.dmp

    Filesize

    64KB

  • memory/2296-43-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-31-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-45-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-1-0x00007FF81DF6D000-0x00007FF81DF6E000-memory.dmp

    Filesize

    4KB

  • memory/2296-42-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-48-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-7-0x00007FF7DDF50000-0x00007FF7DDF60000-memory.dmp

    Filesize

    64KB

  • memory/2296-4-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-6-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-82-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-84-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-83-0x00007FF81DF6D000-0x00007FF81DF6E000-memory.dmp

    Filesize

    4KB

  • memory/2296-85-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-86-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-87-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-90-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-91-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2296-3-0x00007FF7DDF50000-0x00007FF7DDF60000-memory.dmp

    Filesize

    64KB

  • memory/2296-0-0x00007FF7DDF50000-0x00007FF7DDF60000-memory.dmp

    Filesize

    64KB

  • memory/2296-2-0x00007FF7DDF50000-0x00007FF7DDF60000-memory.dmp

    Filesize

    64KB

  • memory/2296-596-0x00007FF7DDF50000-0x00007FF7DDF60000-memory.dmp

    Filesize

    64KB

  • memory/2296-595-0x00007FF7DDF50000-0x00007FF7DDF60000-memory.dmp

    Filesize

    64KB

  • memory/2296-598-0x00007FF7DDF50000-0x00007FF7DDF60000-memory.dmp

    Filesize

    64KB

  • memory/2296-597-0x00007FF7DDF50000-0x00007FF7DDF60000-memory.dmp

    Filesize

    64KB

  • memory/2296-599-0x00007FF81DED0000-0x00007FF81E0C5000-memory.dmp

    Filesize

    2.0MB