Analysis
-
max time kernel
100s -
max time network
149s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
24-11-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
027cc450ef5f8c5f653329641ec1fed9.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745_98STJd8lju.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
ee29b9c01318a1e23836b949942db14d4811246fdae2f41df9f0dcd922c63bc6.js
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
fe2e5d0543b4c8769e401ec216d78a5a3547dfd426fd47e097df04a5f7d6d206_OFkNP1kKL9.rtf
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
myguy.hta
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
svchost.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
fe2e5d0543b4c8769e401ec216d78a5a3547dfd426fd47e097df04a5f7d6d206_OFkNP1kKL9.rtf
-
Size
6KB
-
MD5
415fe69bf32634ca98fa07633f4118e1
-
SHA1
101cc1cb56c407d5b9149f2c3b8523350d23ba84
-
SHA256
fe2e5d0543b4c8769e401ec216d78a5a3547dfd426fd47e097df04a5f7d6d206
-
SHA512
e40ad6adcbdfc47ebf0745aed10a5c6c64d5759a0164dbd7ffb64439deffe710c26a8fd91e8d205f3b2f0c417d70d4e82d5f91874bc6f8bbc9ff123b72c2e692
-
SSDEEP
48:3aT4qf+8xWmXLEEPjH3UNTaOOHG0WomFS/bOhkWTl:3w/xWjFazGMrzQ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1220 WINWORD.EXE 1220 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1220 WINWORD.EXE 1220 WINWORD.EXE 1220 WINWORD.EXE 1220 WINWORD.EXE 1220 WINWORD.EXE 1220 WINWORD.EXE 1220 WINWORD.EXE 1220 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2228 1220 WINWORD.EXE 91 PID 1220 wrote to memory of 2228 1220 WINWORD.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fe2e5d0543b4c8769e401ec216d78a5a3547dfd426fd47e097df04a5f7d6d206_OFkNP1kKL9.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD51071c7f659ac05b93a15257a57db04df
SHA1aafaefffb3160a5280e055dc310d50a35a0122f5
SHA25670e5f9e6efd60f69e7ebe662d5fe98db599835d38c031ffa649a24fa40efd094
SHA512ad7a2f890705e6bb272356f6721d39508c61526f90db85b3f04d34e712027d8264bb2fea2480821284adfe5b3ad0b136a34c29ad1e4941d436d283dd5d0bc764