Resubmissions

13/04/2025, 07:17

250413-h4j1ks1lt5 10

13/04/2025, 07:12

250413-h1v9fa1ky7 10

13/04/2025, 06:41

250413-hft6ms1taw 10

Analysis

  • max time kernel
    145s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/04/2025, 07:12

General

  • Target

    virusshare/3/VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc

  • Size

    34KB

  • MD5

    3fb34964fa7b8c6bfad8d960380ff04e

  • SHA1

    9a3aec40056ce74bac833989ed71dfb6c2626f4c

  • SHA256

    26026b1b3d0cb660c6be6c536df679acca0b5562a3adbb507d001474d23f5650

  • SHA512

    a82b522dfd7eac30292a9e9ab19ddac94563804e77a1090e5f44de7e794ef4e5ebe0e7fb36e5177479417c8176ae0475613700755ca015c7ce941a4740215faa

  • SSDEEP

    384:bzIPMepSbSsG/CdPvunCpeJzKoSS3D6JO5LfBqtjbjk4Eohubn3ezta:nIPMecWsGKVunFFRDE6pqjhust

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:5204
  • C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE"
    1⤵
      PID:2608
    • C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE"
      1⤵
        PID:4956

      Network

      MITRE ATT&CK Enterprise v16

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\TCD6C42.tmp\gb.xsl

        Filesize

        262KB

        MD5

        51d32ee5bc7ab811041f799652d26e04

        SHA1

        412193006aa3ef19e0a57e16acf86b830993024a

        SHA256

        6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

        SHA512

        5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • memory/2608-540-0x00007FFDE9390000-0x00007FFDE93A0000-memory.dmp

        Filesize

        64KB

      • memory/2608-541-0x00007FFDE9390000-0x00007FFDE93A0000-memory.dmp

        Filesize

        64KB

      • memory/2608-542-0x00007FFDE9390000-0x00007FFDE93A0000-memory.dmp

        Filesize

        64KB

      • memory/2608-539-0x00007FFDE9390000-0x00007FFDE93A0000-memory.dmp

        Filesize

        64KB

      • memory/5204-15-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-14-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-9-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-11-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-10-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-7-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-12-0x00007FFDE72E0000-0x00007FFDE72F0000-memory.dmp

        Filesize

        64KB

      • memory/5204-13-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-0-0x00007FFE293AD000-0x00007FFE293AE000-memory.dmp

        Filesize

        4KB

      • memory/5204-17-0x00007FFDE72E0000-0x00007FFDE72F0000-memory.dmp

        Filesize

        64KB

      • memory/5204-16-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-8-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-20-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-19-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-18-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-29-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-30-0x00007FFE293AD000-0x00007FFE293AE000-memory.dmp

        Filesize

        4KB

      • memory/5204-31-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-6-0x00007FFE29310000-0x00007FFE29505000-memory.dmp

        Filesize

        2.0MB

      • memory/5204-4-0x00007FFDE9390000-0x00007FFDE93A0000-memory.dmp

        Filesize

        64KB

      • memory/5204-5-0x00007FFDE9390000-0x00007FFDE93A0000-memory.dmp

        Filesize

        64KB

      • memory/5204-2-0x00007FFDE9390000-0x00007FFDE93A0000-memory.dmp

        Filesize

        64KB

      • memory/5204-3-0x00007FFDE9390000-0x00007FFDE93A0000-memory.dmp

        Filesize

        64KB

      • memory/5204-1-0x00007FFDE9390000-0x00007FFDE93A0000-memory.dmp

        Filesize

        64KB