Analysis

  • max time kernel
    113s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2024 04:31

General

  • Target

    Septorder.rtf

  • Size

    634KB

  • MD5

    4c8e90937a0516f48aa3b8cb17cbc7b8

  • SHA1

    89b8ff3dbb714d2ff658e0c09a65dbc590e19da4

  • SHA256

    7b6a3f5f885e00679f66af1168236c12b3db888689fe8bb7879f994f4160c352

  • SHA512

    84be326e914937e3ebf91824d701de5b2c14d4f4e30dd0b0f6d571f99ceebbd24e6ed947d748e084ac3fe69cca1e43f21b64793cb63130fe5a969917b9314391

  • SSDEEP

    6144:bwAYwAYwAYwAYwAY9A3i0AJW6fiI5zXaW:+

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Septorder.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDF75B.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    4dfea7877dccdb1e25acf4e6e7d5d9af

    SHA1

    3f9765c01eb81de28bec0751796d3cecf14e3487

    SHA256

    0c2cf8d1bd58d3e7dab01b437ca3124c621bdfed8579cb1e9eeb14addb6fe917

    SHA512

    6c84b4a309f812a67f85aaef09b9e2d0fc51fe232b13de262f061a896ad29736353a6c1335dc085e64de9e9a307412e89c685cad453659db098b0f22c6473247

  • memory/4356-16-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-19-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-5-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/4356-7-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/4356-8-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-4-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-10-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-11-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-9-0x00007FF9D7AB0000-0x00007FF9D7AC0000-memory.dmp

    Filesize

    64KB

  • memory/4356-12-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-14-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-0-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/4356-18-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-6-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-17-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-15-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-13-0x00007FF9D7AB0000-0x00007FF9D7AC0000-memory.dmp

    Filesize

    64KB

  • memory/4356-3-0x00007FFA19B2D000-0x00007FFA19B2E000-memory.dmp

    Filesize

    4KB

  • memory/4356-37-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-1-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/4356-2-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/4356-205-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/4356-204-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/4356-207-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/4356-206-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/4356-208-0x00007FFA19A90000-0x00007FFA19C85000-memory.dmp

    Filesize

    2.0MB