Analysis

  • max time kernel
    1788s
  • max time network
    1806s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    13-12-2024 18:01

General

  • Target

    The-MALWARE-Repo-master/Virus/Melissa.doc

  • Size

    40KB

  • MD5

    4b68fdec8e89b3983ceb5190a2924003

  • SHA1

    45588547dc335d87ea5768512b9f3fc72ffd84a3

  • SHA256

    554701bc874da646285689df79e5002b3b1a1f76daf705bea9586640026697ca

  • SHA512

    b2205ad850301f179a078219c6ce29da82f8259f4ec05d980c210718551de916df52c314cb3963f3dd99dcfb9de188bd1c7c9ee310662ece426706493500036f

  • SSDEEP

    384:gfLAmQKcIc719x1XG4rFmWfFlmipS/pwlyIuD9AR49lz02gzIK1Q0jZMuapZtRPl:e1g19/X5fUpMyI4ACIv1nacWPiE

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Virus\Melissa.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/4668-16-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-63-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-13-0x00007FFE6F400000-0x00007FFE6F410000-memory.dmp

    Filesize

    64KB

  • memory/4668-2-0x00007FFE71B10000-0x00007FFE71B20000-memory.dmp

    Filesize

    64KB

  • memory/4668-6-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-8-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-7-0x00007FFE71B10000-0x00007FFE71B20000-memory.dmp

    Filesize

    64KB

  • memory/4668-10-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-9-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-12-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-11-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-5-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-14-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-15-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-3-0x00007FFE71B10000-0x00007FFE71B20000-memory.dmp

    Filesize

    64KB

  • memory/4668-18-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-4-0x00007FFE71B10000-0x00007FFE71B20000-memory.dmp

    Filesize

    64KB

  • memory/4668-20-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-22-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-24-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-26-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-25-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-23-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-21-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-19-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-17-0x00007FFE6F400000-0x00007FFE6F410000-memory.dmp

    Filesize

    64KB

  • memory/4668-0-0x00007FFE71B10000-0x00007FFE71B20000-memory.dmp

    Filesize

    64KB

  • memory/4668-60-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-61-0x00007FFEB1B2D000-0x00007FFEB1B2E000-memory.dmp

    Filesize

    4KB

  • memory/4668-62-0x00007FFEB1A90000-0x00007FFEB1C88000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-1-0x00007FFEB1B2D000-0x00007FFEB1B2E000-memory.dmp

    Filesize

    4KB