Analysis

  • max time kernel
    136s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/10/2024, 12:54

General

  • Target

    mnobizxv.rtf

  • Size

    670KB

  • MD5

    c00a17e56e7eeaf2d72456692c36eec7

  • SHA1

    72fbbce62454aaa611317d1c23a1980712d44613

  • SHA256

    ee1c72ebaf43badfd7469960a19c0b2c54dc7485eff720cab2eb6bb9cf623c04

  • SHA512

    ba0273b1afeb40e3c877fadc20e3ab3960e4db79272b042e500bc896d3986f607de401a2c300f97c42442e2ce4a03c241913a62439e96ff73b9795ad6527db97

  • SSDEEP

    6144:+wAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAsGJ9iX4l5Pyw+bmM:U

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\mnobizxv.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDD599.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    89223f17fdad2568ec6671ed2d7d0e63

    SHA1

    05358f1ef5768a26a85b6ad410768414c34b9388

    SHA256

    48ceb399eda0c232ff3014cb30eb20de3e60e8740cadd2bf50cb12d939af3e74

    SHA512

    3c471e672795f5524b1c77d7e09b8a34cda1058eb18e18330690edbab889c9beaefe50955af22ac3dcf186627369a276290f3e3664fac6e54ed5685f6b605cee

  • memory/3928-7-0x00007FFEA2C30000-0x00007FFEA2E25000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-11-0x00007FFEA2C30000-0x00007FFEA2E25000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-0-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

    Filesize

    64KB

  • memory/3928-4-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

    Filesize

    64KB

  • memory/3928-9-0x00007FFEA2C30000-0x00007FFEA2E25000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-8-0x00007FFEA2C30000-0x00007FFEA2E25000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-3-0x00007FFEA2CCD000-0x00007FFEA2CCE000-memory.dmp

    Filesize

    4KB

  • memory/3928-12-0x00007FFEA2C30000-0x00007FFEA2E25000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-13-0x00007FFEA2C30000-0x00007FFEA2E25000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-1-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

    Filesize

    64KB

  • memory/3928-10-0x00007FFEA2C30000-0x00007FFEA2E25000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-6-0x00007FFEA2C30000-0x00007FFEA2E25000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-14-0x00007FFE607C0000-0x00007FFE607D0000-memory.dmp

    Filesize

    64KB

  • memory/3928-15-0x00007FFE607C0000-0x00007FFE607D0000-memory.dmp

    Filesize

    64KB

  • memory/3928-35-0x00007FFEA2C30000-0x00007FFEA2E25000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-5-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

    Filesize

    64KB

  • memory/3928-2-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

    Filesize

    64KB