Analysis

  • max time kernel
    129s
  • max time network
    306s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-06-2024 22:29

General

  • Target

    Licenses/1049/SQLServerSharedManagementObjects.rtf

  • Size

    77KB

  • MD5

    545c33b84d5ae00fd4ce3163f0423739

  • SHA1

    158f8147f79babce76c9f148424a97860f4599a5

  • SHA256

    7ae38f9b3ba998a1d425fbb615a8b813d94f03282b43c4035ec0d275ab0998ce

  • SHA512

    554bb0c50d67e93b77e7abb1c6dc895a09a28dffdb910393e55cb7a092ebbf60c89367a30685c9b2ebbf292da6da20656e893eaea3bbe5a092203bebc8997775

  • SSDEEP

    768:m07Pnb1uY+BFCxOjjBsycAw9a7Md4rVmQW7zWme7P8Y29FqoOjRBTYcr/7qyOlU:534r8QW7zS3

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Licenses\1049\SQLServerSharedManagementObjects.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:992

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD1AF7.tmp\sist02.xsl
    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • memory/992-11-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-5-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-15-0x00007FFC50420000-0x00007FFC50430000-memory.dmp
    Filesize

    64KB

  • memory/992-4-0x00007FFC53C50000-0x00007FFC53C60000-memory.dmp
    Filesize

    64KB

  • memory/992-16-0x00007FFC50420000-0x00007FFC50430000-memory.dmp
    Filesize

    64KB

  • memory/992-6-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-7-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-195-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-9-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-10-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-12-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-0-0x00007FFC53C50000-0x00007FFC53C60000-memory.dmp
    Filesize

    64KB

  • memory/992-2-0x00007FFC53C50000-0x00007FFC53C60000-memory.dmp
    Filesize

    64KB

  • memory/992-3-0x00007FFC53C50000-0x00007FFC53C60000-memory.dmp
    Filesize

    64KB

  • memory/992-8-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-197-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-196-0x00007FFC93C65000-0x00007FFC93C66000-memory.dmp
    Filesize

    4KB

  • memory/992-198-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-1-0x00007FFC93C65000-0x00007FFC93C66000-memory.dmp
    Filesize

    4KB

  • memory/992-749-0x00007FFC53C50000-0x00007FFC53C60000-memory.dmp
    Filesize

    64KB

  • memory/992-751-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-752-0x00007FFC93BC0000-0x00007FFC93D9B000-memory.dmp
    Filesize

    1.9MB

  • memory/992-750-0x00007FFC53C50000-0x00007FFC53C60000-memory.dmp
    Filesize

    64KB

  • memory/992-748-0x00007FFC53C50000-0x00007FFC53C60000-memory.dmp
    Filesize

    64KB

  • memory/992-747-0x00007FFC53C50000-0x00007FFC53C60000-memory.dmp
    Filesize

    64KB