Analysis

  • max time kernel
    135s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 21:58

General

  • Target

    bd016a3a10a8e28d6a1ef688828c73282db9e17246653b71ee347d977628f155.docm

  • Size

    83KB

  • MD5

    7e884a5c624f84eb907b43d4518f9fd9

  • SHA1

    a93c0597744dc6acd132072ad1ccf11259fd1664

  • SHA256

    bd016a3a10a8e28d6a1ef688828c73282db9e17246653b71ee347d977628f155

  • SHA512

    dc264281bab9ef3d1c51cc04e9d969ce1990c362fd653ddd4188894d069943fd3a017f5bb94f29bcf910231802b2baf16ae562646471d8572b0da5f3f709b94f

  • SSDEEP

    1536:Yj+WqQuctgdgmT1pRFRT0/JDiX9vxgaBtLotjzMLqT+9E/wwkJkT0ioOXCls:k+X8YZPBTgJDwvKavotzMuT+y/wAT0NQ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bd016a3a10a8e28d6a1ef688828c73282db9e17246653b71ee347d977628f155.docm" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2336

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2336-0-0x00007FFDAD4B0000-0x00007FFDAD4C0000-memory.dmp

    Filesize

    64KB

  • memory/2336-3-0x00007FFDAD4B0000-0x00007FFDAD4C0000-memory.dmp

    Filesize

    64KB

  • memory/2336-2-0x00007FFDAD4B0000-0x00007FFDAD4C0000-memory.dmp

    Filesize

    64KB

  • memory/2336-1-0x00007FFDED4CD000-0x00007FFDED4CE000-memory.dmp

    Filesize

    4KB

  • memory/2336-4-0x00007FFDAD4B0000-0x00007FFDAD4C0000-memory.dmp

    Filesize

    64KB

  • memory/2336-5-0x00007FFDAD4B0000-0x00007FFDAD4C0000-memory.dmp

    Filesize

    64KB

  • memory/2336-7-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-10-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-6-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-11-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-13-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-12-0x00007FFDAB100000-0x00007FFDAB110000-memory.dmp

    Filesize

    64KB

  • memory/2336-9-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-8-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-14-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-18-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-22-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-21-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-20-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-19-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-17-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-16-0x00007FFDAB100000-0x00007FFDAB110000-memory.dmp

    Filesize

    64KB

  • memory/2336-15-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-30-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-31-0x00007FFDED430000-0x00007FFDED625000-memory.dmp

    Filesize

    2.0MB