Analysis
-
max time kernel
34s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 08:01
Static task
static1
General
-
Target
[email protected]_SOA.docx
-
Size
459KB
-
MD5
d2d23ccc53607370c926fe786f92c75b
-
SHA1
8a84a9083d5b1e26fb9d0374efec7b259a3d059b
-
SHA256
aca3d8614954a35938653f8a26effa4f96952d8227222ca57dda6ab7cd607424
-
SHA512
2a38f263819d6350fdcc7e12345d68dbb6745eedef50ac261b488f73e534e0cc568c0d7dd909ca1bc438e436a9148aaf0f38f86792d8a92c174faef37e4396ca
-
SSDEEP
6144:hdlcbR5HastSFXbqUAbqUAbqUvyLE8IIIIIW0ru0rqme6eeCe9vCeXhdYp9tmYL2:zARtUVhpr/rqIXM9mrm9Bt2mhW8G0Yf
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4216 WINWORD.EXE 4216 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 4216 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4216 WINWORD.EXE 4216 WINWORD.EXE 4216 WINWORD.EXE 4216 WINWORD.EXE 4216 WINWORD.EXE 4216 WINWORD.EXE 4216 WINWORD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\[email protected]_SOA.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5f6e89e6c3ab17d8d58699ccefeaf3c8d
SHA186c245d0a2ef138aa7afca6bb43316e251b07c68
SHA25632f5bf26d32b42212ada3e88017ad037c6c84f760a64585252576d893a00ff5f
SHA512ab3a82dcd600c7169da373101593480a1ef8e82b2d339b5367f0e2b118f23ec3eb591a3e269de3f5d8b0e0843ec4574b33c5f98e0344c4be38a26c25caccb4b6
-
Filesize
333B
MD50e59b03847285800f35264ff6789c3b5
SHA18ecb6b9c69d2840472e7d73a7445e37c3eb314db
SHA256199aa898ddd5d20af1e4eee33931b96c123103f2edf71ed254f123a254737317
SHA512fb102190e0039a6b4bd41fee69bb8ab37ea2333520cefbc9078f4f09b49e26600bd96b7051862e6d956488051dea0be827a9f9b3775184bd4b0497a4117b91e2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5be2a7c7cde00e95563683cff36d5339d
SHA1e1dd72824c2260f6dfd686aa5b95a55105a7580c
SHA256a6841dc24061afc3060810a52e513bd038e9b5e8585ae233a1c41d025509c377
SHA512c1efab6d7a68c8aa4df628362dbfb99eebd92fbb56caa8e643d56bbbfb6e00a437cd9205d29299a89ef3c97b1288787d8c288cf548f073792d5dbc308e3eb2b6