Resubmissions

01/07/2025, 06:37

250701-hdmc1sdm3x 10

01/07/2025, 05:20

250701-f1tdqs1tew 10

Analysis

  • geolocation tags

    nanew-jerseynorth-americaunited-statesususa
  • max time kernel
    10s
  • max time network
    12s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250619-en
  • resource tags

    arch:x64arch:x86image:win11-20250619-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01/07/2025, 06:37

General

  • Target

    $TEMP/Consequences.dot

  • Size

    87KB

  • MD5

    a77ee830abc2608cc2b16d97d8d62322

  • SHA1

    631a98da3cf8433d24b5c7e0f220f2613d3d955a

  • SHA256

    28140a1897426ea43491b719d3fa3d3567739b0dfac5a9ee15dabbff9aaa6f65

  • SHA512

    b6fd9f2baa689190701a9a95602d8c82bc0d3956a6bfd8902dbdc5a19cc3655b3d3ec65a5f97000f84d3223ffce4c683417370ed472de54a6eefff1cec58ac31

  • SSDEEP

    1536:S752DTsqtUqaYo9VzV4qvf/qJ93QSYVWO5cKv6Bw4sVy:S7sDJUqRWX4qvf/OQDgO0e4sk

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$TEMP\Consequences.dot" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3180

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3180-0-0x00007FFE4B530000-0x00007FFE4B540000-memory.dmp

          Filesize

          64KB

        • memory/3180-3-0x00007FFE4B530000-0x00007FFE4B540000-memory.dmp

          Filesize

          64KB

        • memory/3180-4-0x00007FFE4B530000-0x00007FFE4B540000-memory.dmp

          Filesize

          64KB

        • memory/3180-2-0x00007FFE4B530000-0x00007FFE4B540000-memory.dmp

          Filesize

          64KB

        • memory/3180-1-0x00007FFE8B544000-0x00007FFE8B545000-memory.dmp

          Filesize

          4KB

        • memory/3180-6-0x00007FFE8B4A0000-0x00007FFE8B6A9000-memory.dmp

          Filesize

          2.0MB

        • memory/3180-8-0x00007FFE8B4A0000-0x00007FFE8B6A9000-memory.dmp

          Filesize

          2.0MB

        • memory/3180-7-0x00007FFE4B530000-0x00007FFE4B540000-memory.dmp

          Filesize

          64KB

        • memory/3180-5-0x00007FFE8B4A0000-0x00007FFE8B6A9000-memory.dmp

          Filesize

          2.0MB

        • memory/3180-9-0x00007FFE49290000-0x00007FFE492A0000-memory.dmp

          Filesize

          64KB

        • memory/3180-10-0x00007FFE49290000-0x00007FFE492A0000-memory.dmp

          Filesize

          64KB

        • memory/3180-18-0x00007FFE8B4A0000-0x00007FFE8B6A9000-memory.dmp

          Filesize

          2.0MB

        • memory/3180-17-0x00007FFE8B544000-0x00007FFE8B545000-memory.dmp

          Filesize

          4KB

        • memory/3180-20-0x00007FFE8B4A0000-0x00007FFE8B6A9000-memory.dmp

          Filesize

          2.0MB

        • memory/3180-19-0x00007FFE8B4A0000-0x00007FFE8B6A9000-memory.dmp

          Filesize

          2.0MB