Resubmissions

06/04/2025, 11:17

250406-ndzk8sw1cv 10

06/04/2025, 10:50

250406-mxmv4syqs5 10

Analysis

  • max time kernel
    126s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2025, 11:17

General

  • Target

    7bc2928ce06e7db7bfe0bf3f2c2d2ff9df7f0a8041ea8c593dd0b912c1c3d3fd.zip

  • Size

    634KB

  • MD5

    98d541bf8aae7f2cf3c25d7bf361b329

  • SHA1

    962b7cce490ce169b8f159576b745a3a104f0b38

  • SHA256

    00526ec04e7ec6304f13d35127be12709f619877ea00197b0e9329864694cbd9

  • SHA512

    e9bb2ce765db48a0fe32862047d595689abad806de1939ad031bd54c01e1bf1f280ca2f56ee31ef9a0b275c73c6995b94bccacd27099c713030282c0c20e4e00

  • SSDEEP

    12288:BTXqPKNGJyUAvZRmnv1iWgNyh/qIgQrcWy5bY2wjV5WvGQiq5zkKutnjEuPNHY:RX2bYxRmnv1iWMyUejyRv5wKutnj3G

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 11 IoCs
  • Checks SCSI registry key(s) 3 TTPs 36 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Modifies registry class 16 IoCs
  • Suspicious behavior: AddClipboardFormatListener 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\7bc2928ce06e7db7bfe0bf3f2c2d2ff9df7f0a8041ea8c593dd0b912c1c3d3fd.zip
    1⤵
      PID:220
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\EditUnregister.docx" /o ""
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4024
    • C:\Windows\system32\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ResumeProtect.jpg" /ForceBootstrapPaint3D
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:6004
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
      1⤵
      • Drops file in System32 directory
      PID:512
    • C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe
      "C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"
      1⤵
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4052
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /n "C:\Users\Admin\Desktop\UnlockExpand.xltx"
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4808
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2284
      • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\Downloads\ResumeNew.ppt" /ou ""
        1⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:5844
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\InvokeSelect.docx" /o ""
        1⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:3620

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

        Filesize

        471B

        MD5

        6c0ecd0860026d4cb49700aa54defe51

        SHA1

        a243a5a7fb705b299fac2f98d5de40c93d1d4db3

        SHA256

        9fd23bd3e1c34e580f40d6bb3554ac9d9205c1976b6637c8aa97cbe82e9497c1

        SHA512

        fd4fe933e770909e6f2aeabbcaec819924e7430fbc09ebdd350689c2fd2a4d3003da0f1e28da66f92e7e719f51007fdb12d7c885edf23b3671314491eb8d7903

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

        Filesize

        412B

        MD5

        b06773b8252ec115cc7001cc21f7c8aa

        SHA1

        16078a88547ff374cd3688598fc7f256e9979015

        SHA256

        eaebd11688829173de7428a595d12126dde9532af6c0a756f9b1ad674ebab919

        SHA512

        51f9db6593facb7b169e94769c3aa067f1d4f9943e4ec470df69a225b4b36b85c335c1f6956e122c356a3eb9e5649e79ee7b35271e77489c58711f88fb901985

      • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.CampaignStates.json

        Filesize

        21B

        MD5

        f1b59332b953b3c99b3c95a44249c0d2

        SHA1

        1b16a2ca32bf8481e18ff8b7365229b598908991

        SHA256

        138e49660d259061d8152137abd8829acdfb78b69179890beb489fe3ffe23e0c

        SHA512

        3c1f99ecc394df3741be875fbe8d95e249d1d9ac220805794a22caf81620d5fdd3cce19260d94c0829b3160b28a2b4042e46b56398e60f72134e49254e9679a4

      • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.GovernedChannelStates.json

        Filesize

        417B

        MD5

        c56ff60fbd601e84edd5a0ff1010d584

        SHA1

        342abb130dabeacde1d8ced806d67a3aef00a749

        SHA256

        200e8cc8dd12e22c9720be73092eafb620435d4569dbdcdba9404ace2aa4343c

        SHA512

        acd2054fddb33b55b58b870edd4eb6a3cdd3131dfe6139cb3d27054ac2b2a460694c9be9c2a1da0f85606e95e7f393cf16868b6c654e78a664799bc3418da86e

      • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.Settings.json

        Filesize

        87B

        MD5

        e4e83f8123e9740b8aa3c3dfa77c1c04

        SHA1

        5281eae96efde7b0e16a1d977f005f0d3bd7aad0

        SHA256

        6034f27b0823b2a6a76fe296e851939fd05324d0af9d55f249c79af118b0eb31

        SHA512

        bd6b33fd2bbce4a46991bc0d877695d16f7e60b1959a0defc79b627e569e5c6cac7b4ad4e3e1d8389a08584602a51cf84d44cf247f03beb95f7d307fbba12bb9

      • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.SurveyHistoryStats.json

        Filesize

        14B

        MD5

        6ca4960355e4951c72aa5f6364e459d5

        SHA1

        2fd90b4ec32804dff7a41b6e63c8b0a40b592113

        SHA256

        88301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3

        SHA512

        8544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d

      • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\F0B43EF9-B3E0-4381-9277-5176A8044E83

        Filesize

        178KB

        MD5

        6f3c5c686a4d5a60d222533bf7a7c533

        SHA1

        a278c36541d7f738b1c5d657336afc3d01d07198

        SHA256

        5f80fc427480ac7eb96fdfa1c7f74dcfeafadaa4440743564ba93736c0c3892c

        SHA512

        1e5ba8e518da64fee3b941376ae20927ec0617b2c0773777db45f0db71f0721e36463d0dab0ec3060d790a6ac6b18142d2951b82e28a85c831ea724165828f7a

      • C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\mip\logs\mip_sdk.miplog

        Filesize

        12KB

        MD5

        18930143f80494f68b60c3a35f8b2b95

        SHA1

        3270a944123a268f8823b242b0b25870935607fb

        SHA256

        fb5e4703b3645edbd58302bd36183d6f21381e8a259a096f93a0060fc2e9f9db

        SHA512

        cb3c0c1fef0889abd22153dbdd9a958be87a66b9accdd14162f12dee2754f7cd6910ff23d96ade0bf9fdbf4d355c5aaa57441aa0bc144601966d1931d99fedb8

      • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\winword.exe.db

        Filesize

        24KB

        MD5

        8665de22b67e46648a5a147c1ed296ca

        SHA1

        b289a96fee9fa77dd8e045ae8fd161debd376f48

        SHA256

        b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f

        SHA512

        bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da

      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

        Filesize

        2KB

        MD5

        42236f1b7f35828fe4392f6c6eedc1ff

        SHA1

        3b1c10db267a476136d7ba163d9a590e3f7d2cf7

        SHA256

        8b40d081383ea338c77e6a3425e0bf83607d34421b35e0d34f046d2c3a405ad5

        SHA512

        bdf694741c2e71b11fec0a48bca425111e4f9bf31b6e4cc02e011e4d58903f38ae55f8b16e4f477f4b956a59336686f371b276a0ba94b53c34168e014bfdb63f

      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

        Filesize

        2KB

        MD5

        ec91d2ca3299e99eb5132dc1737fbd8e

        SHA1

        d8d2f7f8fdfa96cbedcd3379869f61bec384342a

        SHA256

        048657637b42396b9310a20ece85d0881506c3f5884a2f70476b87fdcb117533

        SHA512

        7d4bcd367753718e1bfd481eec2f119f03ab39e6b2ad2effaf40c3c897b6ad35c66ac4d92139aa59b0d1d810c7afebd6c9df2d52b643bebf83ef66e695bcc7d2

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json

        Filesize

        238B

        MD5

        7ebd9f1e99b1f5735dad65ab6c6023df

        SHA1

        db43446acdf7f7c9b92465847ace5d49b677be53

        SHA256

        282afdd12bd70aec04fb7824cf9b45587136e12d800cc9be9e979cdfe47a6a1d

        SHA512

        0ffbf41cf6d0f0ba7aa70dad38949407714bd7ad31a84a44988f266508b5fa9cc23a3f94efac045fa07d78de1fce144103c3858a1a5c78d766acf5e760a359e7

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json

        Filesize

        2B

        MD5

        d751713988987e9331980363e24189ce

        SHA1

        97d170e1550eee4afc0af065b78cda302a97674c

        SHA256

        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

        SHA512

        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json

        Filesize

        238B

        MD5

        d726d9798589aa6f14ad23f31f5860fe

        SHA1

        fb66f236307df5955f51d491432b9b10e05451d7

        SHA256

        8d120bd0975d6ee79723fe93b2cb6379d306117256e3382b4d32e7bb619e411a

        SHA512

        52ba632344415818351a046ccff7dfa9a5728e2316990940049db6a35329ca22994fe959b97bd62bc9eb6fd86f81e976ac2e756f0c9a674aaf8702ce2e4cd49d

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json

        Filesize

        2KB

        MD5

        f4e4a03ebd0ab3a953c56a300d61d223

        SHA1

        97a9acf22c3bdd6989d7c120c21077c4d5a9a80e

        SHA256

        52bfb22aa2d7b0ce083d312fb8fa8dcda3063207186f99fc259aebd9064cbedc

        SHA512

        12aa71eea45720a4d7d057da0b662635671e4cd165ad2e0d30a3d2a43950b47dd60c26c1bbbe049418f815850e571b8d93e4c8b8cbbd686abc3cf7926ba719c2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        285B

        MD5

        565bf9e2db0263df91cb4fe274cb937a

        SHA1

        b88b224f91c6a2123304e6112936735ee0584a30

        SHA256

        e886fea073dd01124acc2d45c7dacf77108e99d49cb5a73a2bd51c911f8a4a3d

        SHA512

        b71ea188afb8d0987b6ef633ac6775ec8768d4031b852758656f19ab6ac34ea12a455361c77da1574b8c1d1d5c72b21d8e071590c87668ead6f42a976167eb44

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        285B

        MD5

        cc93303b565f593e9e471cbb4a23e35d

        SHA1

        c6082b9d13697161afda0915e5ffb9244ed37c89

        SHA256

        4dbcd8563fa494c74e8701c20272c25b179c9ad46a51f0e58d28f6d604054610

        SHA512

        ba67c1122f7085a5811057b2ced65511cd8e0a7da4d069d97558b6e7b4fffaa1baa7624395d681e97910870e3fbb2bb5f3cc9172775b8e7aa167c80c2e86c2cc

      • memory/512-76-0x000001CB9A5D0000-0x000001CB9A5D1000-memory.dmp

        Filesize

        4KB

      • memory/512-84-0x000001CB9A6F0000-0x000001CB9A6F1000-memory.dmp

        Filesize

        4KB

      • memory/512-83-0x000001CB9A6F0000-0x000001CB9A6F1000-memory.dmp

        Filesize

        4KB

      • memory/512-82-0x000001CB9A6E0000-0x000001CB9A6E1000-memory.dmp

        Filesize

        4KB

      • memory/512-81-0x000001CB9A6E0000-0x000001CB9A6E1000-memory.dmp

        Filesize

        4KB

      • memory/512-80-0x000001CB9A650000-0x000001CB9A651000-memory.dmp

        Filesize

        4KB

      • memory/512-78-0x000001CB9A650000-0x000001CB9A651000-memory.dmp

        Filesize

        4KB

      • memory/512-69-0x000001CB89980000-0x000001CB89990000-memory.dmp

        Filesize

        64KB

      • memory/512-65-0x000001CB89940000-0x000001CB89950000-memory.dmp

        Filesize

        64KB

      • memory/3620-219-0x00007FFAB8D60000-0x00007FFAB8D70000-memory.dmp

        Filesize

        64KB

      • memory/3620-220-0x00007FFAB8D60000-0x00007FFAB8D70000-memory.dmp

        Filesize

        64KB

      • memory/4024-50-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-2-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4024-62-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4024-63-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4024-61-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4024-60-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4024-54-0x00007FFAFAECD000-0x00007FFAFAECE000-memory.dmp

        Filesize

        4KB

      • memory/4024-55-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-1-0x00007FFAFAECD000-0x00007FFAFAECE000-memory.dmp

        Filesize

        4KB

      • memory/4024-6-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-7-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-3-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4024-4-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4024-14-0x00007FFAB8D60000-0x00007FFAB8D70000-memory.dmp

        Filesize

        64KB

      • memory/4024-5-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4024-0-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4024-8-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-15-0x00007FFAB8D60000-0x00007FFAB8D70000-memory.dmp

        Filesize

        64KB

      • memory/4024-10-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-16-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-9-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-13-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-12-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-64-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-11-0x00007FFAFAE30000-0x00007FFAFB025000-memory.dmp

        Filesize

        2.0MB

      • memory/4808-188-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4808-186-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4808-160-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4808-162-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4808-161-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4808-163-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4808-164-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4808-165-0x00007FFAB8D60000-0x00007FFAB8D70000-memory.dmp

        Filesize

        64KB

      • memory/4808-187-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/4808-167-0x00007FFAB8D60000-0x00007FFAB8D70000-memory.dmp

        Filesize

        64KB

      • memory/4808-185-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/5844-195-0x00007FFAB8D60000-0x00007FFAB8D70000-memory.dmp

        Filesize

        64KB

      • memory/5844-212-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/5844-213-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/5844-210-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/5844-211-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/5844-189-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/5844-191-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/5844-194-0x00007FFAB8D60000-0x00007FFAB8D70000-memory.dmp

        Filesize

        64KB

      • memory/5844-193-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/5844-192-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB

      • memory/5844-190-0x00007FFABAEB0000-0x00007FFABAEC0000-memory.dmp

        Filesize

        64KB