Analysis

  • max time kernel
    133s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2024, 06:56

General

  • Target

    2PaymentCopy.rtf

  • Size

    899KB

  • MD5

    316751bdb6439a13df5d7153e0348d5a

  • SHA1

    4ce31487ca398ee16e3a500be9599724b669af0f

  • SHA256

    8a309b62d7319624bb969198a1e892b8b943a215ac32cda6f2ae48122b23d910

  • SHA512

    926d77a89ef593e55eb02413005a6c6932ea23e9ddd3d769b9a28cec86c29d8ae7109b55814df532417d3baabdb2408805c8b0b178f4a83e036f66880f06e825

  • SSDEEP

    6144:swAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAykns:p0

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2PaymentCopy.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:432

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TCDEE8F.tmp\sist02.xsl

          Filesize

          245KB

          MD5

          f883b260a8d67082ea895c14bf56dd56

          SHA1

          7954565c1f243d46ad3b1e2f1baf3281451fc14b

          SHA256

          ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

          SHA512

          d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          fd9f7d9cf5a5692861472ec85410d4b4

          SHA1

          5880848513c94acc17f3488bb0da212646d9a24a

          SHA256

          0e80c62dc0834bdab6354e80841b97dac8bcc7e55831e92044ecb2a7fed83821

          SHA512

          3ac72a376f5aea87caae131aedcf00e52e865d8bf79b3daef465a5a38677f4fc60a2c997d6174ce5795dc3b4b15d099dd81637926714c49abccf285079c843ba

        • memory/432-11-0x00007FF906710000-0x00007FF906905000-memory.dmp

          Filesize

          2.0MB

        • memory/432-14-0x00007FF906710000-0x00007FF906905000-memory.dmp

          Filesize

          2.0MB

        • memory/432-2-0x00007FF8C6790000-0x00007FF8C67A0000-memory.dmp

          Filesize

          64KB

        • memory/432-4-0x00007FF8C6790000-0x00007FF8C67A0000-memory.dmp

          Filesize

          64KB

        • memory/432-6-0x00007FF906710000-0x00007FF906905000-memory.dmp

          Filesize

          2.0MB

        • memory/432-7-0x00007FF8C6790000-0x00007FF8C67A0000-memory.dmp

          Filesize

          64KB

        • memory/432-9-0x00007FF8C4290000-0x00007FF8C42A0000-memory.dmp

          Filesize

          64KB

        • memory/432-8-0x00007FF906710000-0x00007FF906905000-memory.dmp

          Filesize

          2.0MB

        • memory/432-1-0x00007FF9067AD000-0x00007FF9067AE000-memory.dmp

          Filesize

          4KB

        • memory/432-5-0x00007FF906710000-0x00007FF906905000-memory.dmp

          Filesize

          2.0MB

        • memory/432-15-0x00007FF8C4290000-0x00007FF8C42A0000-memory.dmp

          Filesize

          64KB

        • memory/432-13-0x00007FF906710000-0x00007FF906905000-memory.dmp

          Filesize

          2.0MB

        • memory/432-12-0x00007FF906710000-0x00007FF906905000-memory.dmp

          Filesize

          2.0MB

        • memory/432-10-0x00007FF906710000-0x00007FF906905000-memory.dmp

          Filesize

          2.0MB

        • memory/432-29-0x00007FF906710000-0x00007FF906905000-memory.dmp

          Filesize

          2.0MB

        • memory/432-30-0x00007FF9067AD000-0x00007FF9067AE000-memory.dmp

          Filesize

          4KB

        • memory/432-31-0x00007FF906710000-0x00007FF906905000-memory.dmp

          Filesize

          2.0MB

        • memory/432-32-0x00007FF906710000-0x00007FF906905000-memory.dmp

          Filesize

          2.0MB

        • memory/432-3-0x00007FF8C6790000-0x00007FF8C67A0000-memory.dmp

          Filesize

          64KB

        • memory/432-0-0x00007FF8C6790000-0x00007FF8C67A0000-memory.dmp

          Filesize

          64KB