Analysis

  • max time kernel
    51s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 21:41

General

  • Target

    9483ce32d2782940a10d3adde0672765930fe7ecfac3f8e4cad50b870316b758.docx

  • Size

    12KB

  • MD5

    7d206684fbf955cf16abb54f17c95d7b

  • SHA1

    0aceac53c75bcc176ff64621118e9612f3b3b33b

  • SHA256

    9483ce32d2782940a10d3adde0672765930fe7ecfac3f8e4cad50b870316b758

  • SHA512

    8db6503d82006a9a2d2151d753dfdd4ec52d116b284bd3f5b866d9c7d9b52540d514f93a00a74ed21b2b98315d3db5a75927c4f62ab8487d4c0539df7c1c0d97

  • SSDEEP

    384:C6sZXSIh7hvXGMH111/em5bi4GmZa3Ktz+xZwFLOcqK:CXWEeaXJ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9483ce32d2782940a10d3adde0672765930fe7ecfac3f8e4cad50b870316b758.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VKYZDMA5\word[1].htm

    Filesize

    56B

    MD5

    59ea5cf14c6e67acd7a71bf0a1c49300

    SHA1

    7ac606f111b3080bcd0dc13f36c4a6879261693b

    SHA256

    9dfb11ac68548c120402a769188ae630636688358386e49aaa71fbb221fe813d

    SHA512

    81943f16b80fb45511223e79e9a4d2ac67016ae005ddf8d815d480eb52dd41731deff9ecd2d56ce2a443b33c37782043b4c7db04a33299e91c11269af508f93f

  • C:\Users\Admin\AppData\Local\Temp\TCD5A59.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    975b73f938e99b7062482e7c6f194466

    SHA1

    5d612a5d345f6c9fd33d234cd2b85d9002e732f9

    SHA256

    c57fabf7f8fc231d21ce4598d8c12658966ab10c1a4d2ccb7c96a5bd59ded6be

    SHA512

    18137fb57798ce7e5f3b37ac578497ca3c0c266eaec8b09badabc4f63bc8b91f104ac356646e18a23c6ee1d5bab341e110dd2d8c21d0dc955e21b5e594f07d07

  • memory/4076-16-0x00007FFF74DD0000-0x00007FFF74DE0000-memory.dmp

    Filesize

    64KB

  • memory/4076-22-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-5-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-4-0x00007FFF77110000-0x00007FFF77120000-memory.dmp

    Filesize

    64KB

  • memory/4076-11-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-10-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-13-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-12-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-14-0x00007FFF74DD0000-0x00007FFF74DE0000-memory.dmp

    Filesize

    64KB

  • memory/4076-9-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-15-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-1-0x00007FFF77110000-0x00007FFF77120000-memory.dmp

    Filesize

    64KB

  • memory/4076-17-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-6-0x00007FFF77110000-0x00007FFF77120000-memory.dmp

    Filesize

    64KB

  • memory/4076-21-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-20-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-19-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-18-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-8-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-7-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-2-0x00007FFF77110000-0x00007FFF77120000-memory.dmp

    Filesize

    64KB

  • memory/4076-77-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-78-0x00007FFFB712D000-0x00007FFFB712E000-memory.dmp

    Filesize

    4KB

  • memory/4076-79-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-83-0x00007FFFB7090000-0x00007FFFB7285000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-3-0x00007FFF77110000-0x00007FFF77120000-memory.dmp

    Filesize

    64KB

  • memory/4076-0-0x00007FFFB712D000-0x00007FFFB712E000-memory.dmp

    Filesize

    4KB