Analysis
-
max time kernel
114s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
d63c7600ca42fe65af91ae662ef7b637.rtf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d63c7600ca42fe65af91ae662ef7b637.rtf
Resource
win10v2004-20240802-en
General
-
Target
d63c7600ca42fe65af91ae662ef7b637.rtf
-
Size
78KB
-
MD5
d63c7600ca42fe65af91ae662ef7b637
-
SHA1
6f8bba7b9751ed550d0bd7f6f29e7229888ad6f9
-
SHA256
eb0786d23a2ada26a937a41d56a96514a3df0027ff857d0407d462adfba18ddb
-
SHA512
83f20a16b336f08d817bc427b39a62a0957ec4bf481b10a320e184c378e227fc2bae513245a18c056fdd34e53f0e6b192f6ca2cb16ad0ca123fdd2938dd58427
-
SSDEEP
384:vnHdoOarkwlJbmbKLY17V/W7ZftG5eqVdwRQb65Y2zdfGxswDRa:vnHmOarkwTzs174geqVCFux7a
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 404 WINWORD.EXE 404 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE 404 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d63c7600ca42fe65af91ae662ef7b637.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
18KB
MD54335bef6a9c3972b6cbb55ee07877b22
SHA18737f9559ca01bf8a2f898f0e5f58de7c4549b98
SHA2569333af0183fbd0883b4506dfd845a183c28eb54ba8e622c17df2af29c921b745
SHA512e2f140c37d6ec456df1ce82f099c8c2ce2390bd6a8fcef424dbc49a81e2ff757a0bdb2c920606d234b089da0777f0702d37c61162d06171373ab69929e99247b