Resubmissions

01-07-2024 12:39

240701-pvt8hssbpd 10

01-07-2024 11:57

240701-n4kvrstdkn 4

Analysis

  • max time kernel
    135s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-07-2024 12:39

General

  • Target

    Offer ZI-0428.rtf

  • Size

    293KB

  • MD5

    dde9d7d091ac0cc1d35515d259d8ca6f

  • SHA1

    c6e943143771fc3fd7c2c548f5fddcd6013d9302

  • SHA256

    95be57795b850e5aa098c80a107bafdb581da7653d9b57b8f2d37b89880de224

  • SHA512

    04f282c1b0333925454b7ab1c461c4ae395b0b8148bc6d51fd36368db2dc187daa6d273177d4ad15b50ede52bacf6271062dab70d45b871c8f805a8083844995

  • SSDEEP

    6144:4GuqGuqGuqGuqGuqGuqGuqGuqGuqGu9tNcTr:4

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Offer ZI-0428.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3368

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDB206.tmp\iso690.xsl
    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • memory/3368-13-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-3-0x00007FF9312E0000-0x00007FF9312F0000-memory.dmp
    Filesize

    64KB

  • memory/3368-18-0x00007FF92E470000-0x00007FF92E480000-memory.dmp
    Filesize

    64KB

  • memory/3368-4-0x00007FF9712F5000-0x00007FF9712F6000-memory.dmp
    Filesize

    4KB

  • memory/3368-5-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-10-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-9-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-8-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-12-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-11-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-14-0x00007FF92E470000-0x00007FF92E480000-memory.dmp
    Filesize

    64KB

  • memory/3368-16-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-15-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-0-0x00007FF9312E0000-0x00007FF9312F0000-memory.dmp
    Filesize

    64KB

  • memory/3368-765-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-2-0x00007FF9312E0000-0x00007FF9312F0000-memory.dmp
    Filesize

    64KB

  • memory/3368-23-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-24-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-25-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-27-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-28-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-26-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-1-0x00007FF9312E0000-0x00007FF9312F0000-memory.dmp
    Filesize

    64KB

  • memory/3368-644-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-761-0x00007FF9312E0000-0x00007FF9312F0000-memory.dmp
    Filesize

    64KB

  • memory/3368-763-0x00007FF9312E0000-0x00007FF9312F0000-memory.dmp
    Filesize

    64KB

  • memory/3368-760-0x00007FF9312E0000-0x00007FF9312F0000-memory.dmp
    Filesize

    64KB

  • memory/3368-762-0x00007FF9312E0000-0x00007FF9312F0000-memory.dmp
    Filesize

    64KB

  • memory/3368-764-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB

  • memory/3368-17-0x00007FF971250000-0x00007FF97142B000-memory.dmp
    Filesize

    1.9MB