Analysis

  • max time kernel
    133s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 15:46

General

  • Target

    56a6c0261a72db745ea0f21a3c55c675.rtf

  • Size

    232KB

  • MD5

    56a6c0261a72db745ea0f21a3c55c675

  • SHA1

    3a7b8465d5256b4b9c6d50fc0452a641ab4abe09

  • SHA256

    ea87f3d339f1503e2544d94168480a3085ea9cf379bf8e397a7c08ecebdaaa8b

  • SHA512

    e3021a2ed4dd981cf09c16d29418632abfa640a2159afba260c340e554d62a95e353786050aafeb39493fdbe75ef565f812c9f082221260e12ead4742e6860f7

  • SSDEEP

    3072:qizWhCvLXkOT1PLdNQDjYNMwJwsilLiV0QnCan9uMd4+4gQ:qYdkKajYNMwJ8lLiV0QnBr4+4gQ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\56a6c0261a72db745ea0f21a3c55c675.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDC4B1.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    a75b331e47151b888a5bf665e64bf40a

    SHA1

    33126a273246ff598795aa16946cc1d8864e4af3

    SHA256

    218c1960b12510eff826abe975df21a76909793bfc7ab160e6d2b0edce487943

    SHA512

    81c7ad9383dcd86f91bb42c3d786faf623ada5e24deb24128d77493038d159394a158442ce2bce5cc4fa0e3d17d3e9474176a4f341d9c7df8615c7121ca2f8e9

  • memory/4596-12-0x00007FFC4A400000-0x00007FFC4A410000-memory.dmp

    Filesize

    64KB

  • memory/4596-8-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-15-0x00007FFC4A400000-0x00007FFC4A410000-memory.dmp

    Filesize

    64KB

  • memory/4596-7-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-18-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-11-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-10-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-20-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-6-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-13-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-1-0x00007FFC4C9B0000-0x00007FFC4C9C0000-memory.dmp

    Filesize

    64KB

  • memory/4596-16-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-0-0x00007FFC8C9CD000-0x00007FFC8C9CE000-memory.dmp

    Filesize

    4KB

  • memory/4596-2-0x00007FFC4C9B0000-0x00007FFC4C9C0000-memory.dmp

    Filesize

    64KB

  • memory/4596-9-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-19-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-17-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-14-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-5-0x00007FFC4C9B0000-0x00007FFC4C9C0000-memory.dmp

    Filesize

    64KB

  • memory/4596-31-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-32-0x00007FFC8C9CD000-0x00007FFC8C9CE000-memory.dmp

    Filesize

    4KB

  • memory/4596-33-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-3-0x00007FFC4C9B0000-0x00007FFC4C9C0000-memory.dmp

    Filesize

    64KB

  • memory/4596-39-0x00007FFC8C930000-0x00007FFC8CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-4-0x00007FFC4C9B0000-0x00007FFC4C9C0000-memory.dmp

    Filesize

    64KB