Analysis

  • max time kernel
    436s
  • max time network
    442s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    03/04/2025, 09:22

General

  • Target

    EMV Reader Writer/EMV Reader Writer/EmvManual.rtf

  • Size

    14.8MB

  • MD5

    0f43d2e0fd0d4661f2e7799070245587

  • SHA1

    275d687f6e4f8a83011ba43735256de3cd06a6e3

  • SHA256

    a8cf72ddd20d716ce862a23428cfdb9b1bb168a57652e12a9e95bb3b21359032

  • SHA512

    60c3540d3dd36c564b2cf3a4c917674a1fcc0eee4fcb6c6a59b43499f31d0beed06a91f42881ee09baaa2d98ebb5ddec30024e23fa66e9534c10981010c74fb8

  • SSDEEP

    6144:qoufDrLggDHTseUjMXCZr2418l43Wmc8SBbVUUUmYAUUUpD7mou40eIRUUUkeeb8:RN1hqYTRQGPFNptTLIlkEwlr

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\EMV Reader Writer\EmvManual.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:5128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851227[[fn=sist02]].xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    16B

    MD5

    d29962abc88624befc0135579ae485ec

    SHA1

    e40a6458296ec6a2427bcb280572d023a9862b31

    SHA256

    a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

    SHA512

    4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

  • memory/5128-12-0x00007FFB9AF80000-0x00007FFB9AF90000-memory.dmp

    Filesize

    64KB

  • memory/5128-22-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-4-0x00007FFB9CFF0000-0x00007FFB9D000000-memory.dmp

    Filesize

    64KB

  • memory/5128-6-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-5-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-8-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-9-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-11-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-10-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-7-0x00007FFB9CFF0000-0x00007FFB9D000000-memory.dmp

    Filesize

    64KB

  • memory/5128-13-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-14-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-1-0x00007FFB9CFF0000-0x00007FFB9D000000-memory.dmp

    Filesize

    64KB

  • memory/5128-15-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-0-0x00007FFB9CFF0000-0x00007FFB9D000000-memory.dmp

    Filesize

    64KB

  • memory/5128-19-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-16-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-20-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-18-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-17-0x00007FFB9AF80000-0x00007FFB9AF90000-memory.dmp

    Filesize

    64KB

  • memory/5128-21-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-2-0x00007FFB9CFF0000-0x00007FFB9D000000-memory.dmp

    Filesize

    64KB

  • memory/5128-40-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB

  • memory/5128-3-0x00007FFBDD00D000-0x00007FFBDD00E000-memory.dmp

    Filesize

    4KB

  • memory/5128-547-0x00007FFB9CFF0000-0x00007FFB9D000000-memory.dmp

    Filesize

    64KB

  • memory/5128-548-0x00007FFB9CFF0000-0x00007FFB9D000000-memory.dmp

    Filesize

    64KB

  • memory/5128-546-0x00007FFB9CFF0000-0x00007FFB9D000000-memory.dmp

    Filesize

    64KB

  • memory/5128-549-0x00007FFB9CFF0000-0x00007FFB9D000000-memory.dmp

    Filesize

    64KB

  • memory/5128-550-0x00007FFBDCF70000-0x00007FFBDD168000-memory.dmp

    Filesize

    2.0MB