Analysis

  • max time kernel
    133s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 06:56

General

  • Target

    2PaymentCopy.rtf

  • Size

    899KB

  • MD5

    316751bdb6439a13df5d7153e0348d5a

  • SHA1

    4ce31487ca398ee16e3a500be9599724b669af0f

  • SHA256

    8a309b62d7319624bb969198a1e892b8b943a215ac32cda6f2ae48122b23d910

  • SHA512

    926d77a89ef593e55eb02413005a6c6932ea23e9ddd3d769b9a28cec86c29d8ae7109b55814df532417d3baabdb2408805c8b0b178f4a83e036f66880f06e825

  • SSDEEP

    6144:swAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAykns:p0

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2PaymentCopy.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDEE8F.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    fd9f7d9cf5a5692861472ec85410d4b4

    SHA1

    5880848513c94acc17f3488bb0da212646d9a24a

    SHA256

    0e80c62dc0834bdab6354e80841b97dac8bcc7e55831e92044ecb2a7fed83821

    SHA512

    3ac72a376f5aea87caae131aedcf00e52e865d8bf79b3daef465a5a38677f4fc60a2c997d6174ce5795dc3b4b15d099dd81637926714c49abccf285079c843ba

  • memory/432-11-0x00007FF906710000-0x00007FF906905000-memory.dmp

    Filesize

    2.0MB

  • memory/432-14-0x00007FF906710000-0x00007FF906905000-memory.dmp

    Filesize

    2.0MB

  • memory/432-2-0x00007FF8C6790000-0x00007FF8C67A0000-memory.dmp

    Filesize

    64KB

  • memory/432-4-0x00007FF8C6790000-0x00007FF8C67A0000-memory.dmp

    Filesize

    64KB

  • memory/432-6-0x00007FF906710000-0x00007FF906905000-memory.dmp

    Filesize

    2.0MB

  • memory/432-7-0x00007FF8C6790000-0x00007FF8C67A0000-memory.dmp

    Filesize

    64KB

  • memory/432-9-0x00007FF8C4290000-0x00007FF8C42A0000-memory.dmp

    Filesize

    64KB

  • memory/432-8-0x00007FF906710000-0x00007FF906905000-memory.dmp

    Filesize

    2.0MB

  • memory/432-1-0x00007FF9067AD000-0x00007FF9067AE000-memory.dmp

    Filesize

    4KB

  • memory/432-5-0x00007FF906710000-0x00007FF906905000-memory.dmp

    Filesize

    2.0MB

  • memory/432-15-0x00007FF8C4290000-0x00007FF8C42A0000-memory.dmp

    Filesize

    64KB

  • memory/432-13-0x00007FF906710000-0x00007FF906905000-memory.dmp

    Filesize

    2.0MB

  • memory/432-12-0x00007FF906710000-0x00007FF906905000-memory.dmp

    Filesize

    2.0MB

  • memory/432-10-0x00007FF906710000-0x00007FF906905000-memory.dmp

    Filesize

    2.0MB

  • memory/432-29-0x00007FF906710000-0x00007FF906905000-memory.dmp

    Filesize

    2.0MB

  • memory/432-30-0x00007FF9067AD000-0x00007FF9067AE000-memory.dmp

    Filesize

    4KB

  • memory/432-31-0x00007FF906710000-0x00007FF906905000-memory.dmp

    Filesize

    2.0MB

  • memory/432-32-0x00007FF906710000-0x00007FF906905000-memory.dmp

    Filesize

    2.0MB

  • memory/432-3-0x00007FF8C6790000-0x00007FF8C67A0000-memory.dmp

    Filesize

    64KB

  • memory/432-0-0x00007FF8C6790000-0x00007FF8C67A0000-memory.dmp

    Filesize

    64KB