Analysis

  • max time kernel
    133s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 17:17

General

  • Target

    $PLUGINSDIR/license_pbr.rtf

  • Size

    65KB

  • MD5

    d27946865ca1eadb4e44ed2f0a612cb6

  • SHA1

    3b764b75d8ef713d0f338227aae7dd11ae4427c1

  • SHA256

    45df50add034de53c266945c24181160d308342e848872b133effc1077fe02ee

  • SHA512

    d18f9e9165ad96634b2ded4ef3a772156329a69ed6680f1a65bd016bbe2789d9115a1b05af469e37333294ad7e330a35b3813911a546f04226e9faef5b209238

  • SSDEEP

    768:je6mikHrBLxRYMHX6YXL5UMHX6YhL5UMHX6YyLvRYMHX6YJZcXlBGBBuBLxRYMHf:Sn4vtybALZiLiSxp7kDe

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\license_pbr.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4516

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TCD5D8.tmp\gb.xsl

          Filesize

          262KB

          MD5

          51d32ee5bc7ab811041f799652d26e04

          SHA1

          412193006aa3ef19e0a57e16acf86b830993024a

          SHA256

          6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

          SHA512

          5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          2KB

          MD5

          505d8a3b40cdb7b72f918dabb649bfc6

          SHA1

          731668e5ba38df4e8908f3979c7b9b5e510fb076

          SHA256

          1797733217bd20b3ae7e6510f9557535e8bb499bd12576abc147642ab9bb65bb

          SHA512

          638a157d3053febcc354c2a9172f0d44d5f5ca04efcd6d7825c07ba53fdefa52449ed11fd4687adc868188093ad63e5a7097859de5cdece1a85abd10332ae23a

        • memory/4516-21-0x00007FF9B44F0000-0x00007FF9B4500000-memory.dmp

          Filesize

          64KB

        • memory/4516-35-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-3-0x00007FF9B6DB0000-0x00007FF9B6DC0000-memory.dmp

          Filesize

          64KB

        • memory/4516-2-0x00007FF9B6DB0000-0x00007FF9B6DC0000-memory.dmp

          Filesize

          64KB

        • memory/4516-11-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-13-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-12-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-14-0x00007FF9B44F0000-0x00007FF9B4500000-memory.dmp

          Filesize

          64KB

        • memory/4516-10-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-16-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-18-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-20-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-5-0x00007FF9B6DB0000-0x00007FF9B6DC0000-memory.dmp

          Filesize

          64KB

        • memory/4516-0-0x00007FF9F6DCD000-0x00007FF9F6DCE000-memory.dmp

          Filesize

          4KB

        • memory/4516-7-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-15-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-9-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-8-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-17-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-6-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-33-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-34-0x00007FF9F6DCD000-0x00007FF9F6DCE000-memory.dmp

          Filesize

          4KB

        • memory/4516-19-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-36-0x00007FF9F6D30000-0x00007FF9F6F25000-memory.dmp

          Filesize

          2.0MB

        • memory/4516-4-0x00007FF9B6DB0000-0x00007FF9B6DC0000-memory.dmp

          Filesize

          64KB

        • memory/4516-1-0x00007FF9B6DB0000-0x00007FF9B6DC0000-memory.dmp

          Filesize

          64KB