Resubmissions

21-11-2024 07:21

241121-h65p3azlds 7

21-11-2024 07:16

241121-h35kwstqhr 7

Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    21-11-2024 07:16

General

  • Target

    test.docx

  • Size

    20KB

  • MD5

    b536de7d75b67ba7662278ca04431ab2

  • SHA1

    d6ed84e51a50068701a0f26c26c99250801befe0

  • SHA256

    66890795aa43d5305905fb7a1dbd43ce6612b092507430a3f2e88cab0ba8fee9

  • SHA512

    401d2c22b05033796ff5b8a0ac46aa8140806c0a72f489823e75284ef1591bf3184deb238f38dd7455ef074be15456eab09aaf184d54a0885604c8858cc019be

  • SSDEEP

    384:phMDIDDhBhDsdoDsjhLhnFDkfsXyBiiyHlDf2M2hMDIDDhBhDsdoDsjhLhIDFDkI:phMDIDDhBhDsdoDsjhLhnFDkfsXyBiiB

Score
7/10

Malware Config

Signatures

  • A potential corporate email address has been identified in the URL: [email protected]
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\test.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD4CAC.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    72c58d847202f6925936a689b252e5f8

    SHA1

    f53994aa67b2c1cfefa2b00d64ff4728d04258eb

    SHA256

    f5db1b474cbaa9ff8ae0ece872e117e6a9024a2a95f9d11d040402bc5dc889b4

    SHA512

    541b827e62e808d67f2f0638979b579746041bbc0aa34ae7d77630387f86e78fed95d6a73e84ede78933e63a771ba0dc6b59fc0449443e26881be896b71a52b0

  • memory/3676-34-0x00007FF9DF7ED000-0x00007FF9DF7EE000-memory.dmp

    Filesize

    4KB

  • memory/3676-10-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-38-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-6-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-8-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-7-0x00007FF99F7D0000-0x00007FF99F7E0000-memory.dmp

    Filesize

    64KB

  • memory/3676-5-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-36-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-9-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-11-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-14-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-13-0x00007FF99CF70000-0x00007FF99CF80000-memory.dmp

    Filesize

    64KB

  • memory/3676-1-0x00007FF9DF7ED000-0x00007FF9DF7EE000-memory.dmp

    Filesize

    4KB

  • memory/3676-15-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-18-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-19-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-17-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-12-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-33-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-35-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-16-0x00007FF99CF70000-0x00007FF99CF80000-memory.dmp

    Filesize

    64KB

  • memory/3676-0-0x00007FF99F7D0000-0x00007FF99F7E0000-memory.dmp

    Filesize

    64KB

  • memory/3676-2-0x00007FF99F7D0000-0x00007FF99F7E0000-memory.dmp

    Filesize

    64KB

  • memory/3676-39-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-37-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-40-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-42-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-46-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-51-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-52-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-50-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-49-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-48-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-47-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-45-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-44-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-43-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-41-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-56-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-57-0x00007FF9DF750000-0x00007FF9DF948000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-3-0x00007FF99F7D0000-0x00007FF99F7E0000-memory.dmp

    Filesize

    64KB

  • memory/3676-4-0x00007FF99F7D0000-0x00007FF99F7E0000-memory.dmp

    Filesize

    64KB