Analysis

  • max time kernel
    46s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2024 21:08

General

  • Target

    4052808933352ca1d48c49de6c7635d3736de9a8665cb40b74f7c5fdf72c01a3.doc

  • Size

    36KB

  • MD5

    10e8b4603e3d74e1313a8b1bfe769aba

  • SHA1

    7c3be0d85bcaaa2971cd11d27daa3a768dbac607

  • SHA256

    4052808933352ca1d48c49de6c7635d3736de9a8665cb40b74f7c5fdf72c01a3

  • SHA512

    250f7ff7d06ab1bd1e0783be6161c5abad63038846d09cb1e93acc1039c55a32296ecd22392e3cb22a1821bf032325da0661c6f1d603346e4b853579384dc7a6

  • SSDEEP

    384:V2iSwvxjk+t06DANg0jnYp+pwImOHZeAtg:VZxw+tWyeYp+pwiHZ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4052808933352ca1d48c49de6c7635d3736de9a8665cb40b74f7c5fdf72c01a3.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD392.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    07b11d9a08f50863c1d1a79ac982500d

    SHA1

    6162e73568017dd01861726c87e0962d962f597d

    SHA256

    0dbda2843561cf2f02684dd3b654e9085aaeaff335b518852fd6eecf116f05b5

    SHA512

    eb6af944c0fc02ca0ebe61449a9cc4f845594696b6ea489adb8bccdf73c2bdadd25565192b9a6f39966737e6f52d294e789341118b6c41c349c9b3802b74d21a

  • memory/3220-15-0x00007FFDF3560000-0x00007FFDF3570000-memory.dmp

    Filesize

    64KB

  • memory/3220-5-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-17-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-19-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-4-0x00007FFDF5B90000-0x00007FFDF5BA0000-memory.dmp

    Filesize

    64KB

  • memory/3220-7-0x00007FFDF5B90000-0x00007FFDF5BA0000-memory.dmp

    Filesize

    64KB

  • memory/3220-10-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-11-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-9-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-12-0x00007FFDF3560000-0x00007FFDF3570000-memory.dmp

    Filesize

    64KB

  • memory/3220-14-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-13-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-2-0x00007FFDF5B90000-0x00007FFDF5BA0000-memory.dmp

    Filesize

    64KB

  • memory/3220-1-0x00007FFE35BAD000-0x00007FFE35BAE000-memory.dmp

    Filesize

    4KB

  • memory/3220-6-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-18-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-16-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-8-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-26-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-35-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-41-0x00007FFE35BAD000-0x00007FFE35BAE000-memory.dmp

    Filesize

    4KB

  • memory/3220-42-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-44-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-0-0x00007FFDF5B90000-0x00007FFDF5BA0000-memory.dmp

    Filesize

    64KB

  • memory/3220-50-0x00007FFE35B10000-0x00007FFE35D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-3-0x00007FFDF5B90000-0x00007FFDF5BA0000-memory.dmp

    Filesize

    64KB