Analysis

  • max time kernel
    101s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 12:09

General

  • Target

    0bcafe072d2547b55f7748bfd3fe84c3c17c1d2c9078333f9f06af759bba38ed.docx

  • Size

    56KB

  • MD5

    95f392dd9c1351f3a6678650efab939c

  • SHA1

    f8504a35428357cd896b4e8d61c42deb2ffe5aab

  • SHA256

    0bcafe072d2547b55f7748bfd3fe84c3c17c1d2c9078333f9f06af759bba38ed

  • SHA512

    35d77e7370679d8d828a3d38da9713479496d14207026a168724a2425b6a12a7bc96c72ade6d47fd9beea5bb656ef2a243b34553bc3495aac12db3444721f854

  • SSDEEP

    1536:af6VyFNvFEYsyN//N4D9bkUEk010LTSv3g6WTQw4:afqON9NnNXq52kHLWv39pN

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0bcafe072d2547b55f7748bfd3fe84c3c17c1d2c9078333f9f06af759bba38ed.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\3582496D.emf

    Filesize

    5KB

    MD5

    f1a9489b0ed774772224be13c2655b74

    SHA1

    9f686725174f0f18edb9746220a9d5284aa2822b

    SHA256

    b7e3640d6ee9df006c42b20011f3453d3017a29bdac7ceae57b3064e9af7a449

    SHA512

    67e52b17a8b7f10492d52d04caeba8d3290d911e637b5d00bd35deaedf8b83f39f7188bdf557b499d5aa746828a898aa61d4fb79b26fe0bd18973a6011f3362c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\5CFFA01C.emf

    Filesize

    5KB

    MD5

    423df84ebc7dbb100bbbe9e8161fe423

    SHA1

    618239ee0f165d88bee62c33c1e82051e39c3945

    SHA256

    4872fc5531508883b894254b2970250c723c740a5a1bdef4892892c42a24e324

    SHA512

    04a8f133e44955ece4204f66148bd50a52857a671992c8b6aa891418f1d51b36bf3ac8973daff4673de36d66496ea7ddb8083cb231a4444d627882b43959f943

  • C:\Users\Admin\AppData\Local\Temp\TCDF56B.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    d2b699bd60218e3932c72f5093fe34e5

    SHA1

    7716cf63b70fa07afc1fd1055b5799f556c56d31

    SHA256

    90c20813e4079422100fc35b18b705246b7651dda9c88c68a7bf0440e91dc228

    SHA512

    ed29c0b528a7cdc5358cd17fd77c6b1477977016c177ff518907d4823838409c4fa588745f477e9614919f0f35cf8dbb9138085391c26389ca714e1f261497ae

  • memory/2288-12-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-15-0x00007FF9D7AB0000-0x00007FF9D7AC0000-memory.dmp

    Filesize

    64KB

  • memory/2288-6-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/2288-9-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-10-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-11-0x00007FF9D7AB0000-0x00007FF9D7AC0000-memory.dmp

    Filesize

    64KB

  • memory/2288-8-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-7-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-2-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/2288-13-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-14-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-5-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-0-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/2288-3-0x00007FFA19B2D000-0x00007FFA19B2E000-memory.dmp

    Filesize

    4KB

  • memory/2288-51-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-4-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/2288-1-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/2288-221-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/2288-222-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/2288-224-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/2288-223-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/2288-225-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB