Resubmissions

28/03/2025, 16:52

250328-vdc6kazry9 9

24/03/2025, 22:22

250324-2aphra1jx7 10

Analysis

  • max time kernel
    864s
  • max time network
    439s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2025, 22:22

General

  • Target

    5 Rules for Snort.doc

  • Size

    49KB

  • MD5

    62136f5df0820cc715dd2588c1449393

  • SHA1

    56a93d6cd44a612c054522c3adcb77f3b117b300

  • SHA256

    2e1136a2bfddb108cd3b3a60761113797265b281085ae35e185a4233d2e75d8e

  • SHA512

    e34504e3f131c0209c55da3411ec25380737e3d08a1021a9cde31691f5a533f60f1a3a0ccc364ef7b6a2e4c68d3edd0e5485559d1e0de899a9f6d2754fd1740d

  • SSDEEP

    384:K6nw8jaXLGkMFtv/2Su1Y5xAEO3QG9yhB+m9VvK2m6aj0jphRG:K64bG5xp89yz2jGh

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5 Rules for Snort.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDC677.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Local\Temp\~WRD0000.tmp

    Filesize

    47KB

    MD5

    567afc076b4c34862871a84e411ac7e6

    SHA1

    46e81a916feba876f79b53a48095ba1b8c97bc17

    SHA256

    511b1bdadf634c1f3d5cabfc96155021a2ad1d076ecad9a33b2bef8ad163e84b

    SHA512

    3e403e5ee8c20ccc2e386ada105387d81c9fbf919beeecf2e1801c52e061816f72005e594c40276e3947ba17b84baab852b76141e2414b901c8773a77af211a5

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    7b98ca87bcd49268b41ad15b59f21fa4

    SHA1

    e7ec63508475d96b6c1c67e46e38d7186e15ef1a

    SHA256

    ee2c52073081402d7eb252ca3228e66f9dff42ed8375ed6a0b149b3f650c174d

    SHA512

    162ff0e1bfda2cc07351a679a92780e5d79022bb7b8b66b36373808066b00faa98e6d6df3dd97d27a7c249a25ea46a829c89440a6b5d9429951b5076570c072b

  • memory/844-4-0x00007FFB03E90000-0x00007FFB03EA0000-memory.dmp

    Filesize

    64KB

  • memory/844-38-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-8-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-7-0x00007FFB03E90000-0x00007FFB03EA0000-memory.dmp

    Filesize

    64KB

  • memory/844-0-0x00007FFB03E90000-0x00007FFB03EA0000-memory.dmp

    Filesize

    64KB

  • memory/844-9-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-12-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-10-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-11-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-14-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-16-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-15-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-13-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-17-0x00007FFB016D0000-0x00007FFB016E0000-memory.dmp

    Filesize

    64KB

  • memory/844-18-0x00007FFB016D0000-0x00007FFB016E0000-memory.dmp

    Filesize

    64KB

  • memory/844-5-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-43-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-45-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-44-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-6-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-2-0x00007FFB03E90000-0x00007FFB03EA0000-memory.dmp

    Filesize

    64KB

  • memory/844-72-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-73-0x00007FFB43EAD000-0x00007FFB43EAE000-memory.dmp

    Filesize

    4KB

  • memory/844-74-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-75-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-76-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-77-0x00007FFB43E10000-0x00007FFB44005000-memory.dmp

    Filesize

    2.0MB

  • memory/844-3-0x00007FFB03E90000-0x00007FFB03EA0000-memory.dmp

    Filesize

    64KB

  • memory/844-1-0x00007FFB43EAD000-0x00007FFB43EAE000-memory.dmp

    Filesize

    4KB