Analysis

  • max time kernel
    299s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2024 05:41

General

  • Target

    15112024_0541_14112024_Bank Swift Copy.docx

  • Size

    459KB

  • MD5

    3f9ae2b975cec92e0402d614cd2391a5

  • SHA1

    43d41944021358bee6b6b48594d9c3f54fbaecd5

  • SHA256

    27a37162f8f0baf5fe161825f8108f1f3e20bada83c2be08fe9919c60e4727b8

  • SHA512

    1a14966056b58e84438309a1dea5ed4d5a6036b76cde5b0baec395d87bcfb2edf596bf9c201c0310847972f89c04c866f2008e938791b233ffb7042365222771

  • SSDEEP

    6144:drlcbR5HastSFXbqUAbqUAbqUvyLE8IIIIIW0ru0rqme6eeCe9vCeXhdwt9tmYL+:RARtUVhpr/rqIXg9mrm9Bt2mhW8G0Y1Z

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\15112024_0541_14112024_Bank Swift Copy.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VKYZDMA5\xXdquUOrM1vD3An[1].doc

    Filesize

    799KB

    MD5

    2087de574fefae441db7ced132da6407

    SHA1

    6d8b4083d71075be31068808232805ea486f77d8

    SHA256

    dc8ae41681fdf19abcf62b27b3d8359c32ba6f20bee1e24b7ce9b37d4faebe8b

    SHA512

    02ead1047af13379ee161c25e1db2c83033daf752629159b9c5836ed0c1d5f6436da73299d920cc10cefe6d4edd3272266d9b4f2088225bc434a53c20ba43ce9

  • C:\Users\Admin\AppData\Local\Temp\TCD168E.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    341B

    MD5

    cfc69f595ff0097ef626b4b7e927c071

    SHA1

    ff9f7d401c938e44c83128797c80e73e7a561b64

    SHA256

    7dcc07df332f911c99856c03e1c7fb03fd3e96e1c670a349415c41733ac85aad

    SHA512

    2741b407c446dca60f7175e878d3c3dd73350251d76bfe9cd67dc6274ba52ba3d1400cc986bfa98aacbe971052cd4fd1fc08865912b90c0ea1acc4f92b4d75de

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    16B

    MD5

    d29962abc88624befc0135579ae485ec

    SHA1

    e40a6458296ec6a2427bcb280572d023a9862b31

    SHA256

    a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

    SHA512

    4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/2344-20-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-66-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-9-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-8-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-7-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-12-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-13-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-11-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-10-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-15-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-16-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-17-0x00007FFC9DFB0000-0x00007FFC9DFC0000-memory.dmp

    Filesize

    64KB

  • memory/2344-14-0x00007FFC9DFB0000-0x00007FFC9DFC0000-memory.dmp

    Filesize

    64KB

  • memory/2344-19-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-21-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-3-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/2344-18-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-0-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/2344-4-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/2344-6-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-67-0x00007FFCE06AD000-0x00007FFCE06AE000-memory.dmp

    Filesize

    4KB

  • memory/2344-74-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-79-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-78-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-77-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-76-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-75-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-73-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-72-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-71-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-70-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-69-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-68-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-83-0x00007FFCE0610000-0x00007FFCE0805000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-5-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB

  • memory/2344-1-0x00007FFCE06AD000-0x00007FFCE06AE000-memory.dmp

    Filesize

    4KB

  • memory/2344-2-0x00007FFCA0690000-0x00007FFCA06A0000-memory.dmp

    Filesize

    64KB