Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2024 03:39

General

  • Target

    e164bb4a190f79c58b836441a8f59bf3ead186f359fbac64b0e86e7e058c0efe.rtf

  • Size

    111KB

  • MD5

    b2daf885c5199ed93bfdafe0f3a33ae6

  • SHA1

    3d2dba1d76e2bfcae449113de1597d0c725b3421

  • SHA256

    e164bb4a190f79c58b836441a8f59bf3ead186f359fbac64b0e86e7e058c0efe

  • SHA512

    662cf497918cabc230d8f857826cf6ed67b58288bd1dd8f61c617fe41b0a9034acc957716aa6f4e860d5546652d158be9b0aaec231034a8dad5a533dcb8381e2

  • SSDEEP

    384:GSXY16lFxTu95qsyeYJZw9IHJkJhvO6CC9GBRKdEQj3Mh/xyc11wtSuQO7HBLOWk:hXc/XBoGGBgnj3Mh/71wtSuQULOWk

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e164bb4a190f79c58b836441a8f59bf3ead186f359fbac64b0e86e7e058c0efe.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDF5EF.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    76b04826ea8b4426ab1bdb2da4045c6f

    SHA1

    aedec8319ffb9c752d83396410acde0043dcb33b

    SHA256

    86e9faa7f92872f7b0d3f084d4b873a9168957952d88f4e79f4ad4be99493f39

    SHA512

    25ac1effef0d12f5e8ec14719b84b6a051b62de50f47c4865a2f0c6332bba7293ad8a0ecc1b43db5d3fa228fdf2edee4b5be29c3edf7fd6f3d6ccaa7af838472

  • memory/2788-12-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-1-0x00007FFE0D5ED000-0x00007FFE0D5EE000-memory.dmp

    Filesize

    4KB

  • memory/2788-0-0x00007FFDCD5D0000-0x00007FFDCD5E0000-memory.dmp

    Filesize

    64KB

  • memory/2788-7-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-6-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-9-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-8-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-5-0x00007FFDCD5D0000-0x00007FFDCD5E0000-memory.dmp

    Filesize

    64KB

  • memory/2788-11-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-16-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-4-0x00007FFDCD5D0000-0x00007FFDCD5E0000-memory.dmp

    Filesize

    64KB

  • memory/2788-2-0x00007FFDCD5D0000-0x00007FFDCD5E0000-memory.dmp

    Filesize

    64KB

  • memory/2788-10-0x00007FFDCB410000-0x00007FFDCB420000-memory.dmp

    Filesize

    64KB

  • memory/2788-15-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-14-0x00007FFDCB410000-0x00007FFDCB420000-memory.dmp

    Filesize

    64KB

  • memory/2788-18-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-17-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-30-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-31-0x00007FFE0D5ED000-0x00007FFE0D5EE000-memory.dmp

    Filesize

    4KB

  • memory/2788-32-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-3-0x00007FFDCD5D0000-0x00007FFDCD5E0000-memory.dmp

    Filesize

    64KB

  • memory/2788-38-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB

  • memory/2788-13-0x00007FFE0D550000-0x00007FFE0D745000-memory.dmp

    Filesize

    2.0MB