Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows10_x64 -
resource
win10 -
submitted
09/07/2020, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
e6625525c973bb4304585038917d2a00691c56ce613f2f92b848d45238f3260e.doc
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e6625525c973bb4304585038917d2a00691c56ce613f2f92b848d45238f3260e.doc
Resource
win10
0 signatures
0 seconds
General
-
Target
e6625525c973bb4304585038917d2a00691c56ce613f2f92b848d45238f3260e.doc
-
Size
134KB
-
MD5
0061b8f9266262024f9a57bd80ae5e90
-
SHA1
dcc6f86636d86a533a879b287af97f03b71c75f1
-
SHA256
e6625525c973bb4304585038917d2a00691c56ce613f2f92b848d45238f3260e
-
SHA512
30491b1d2b98e207eca053f6e9575098d0282daab1095ca0717c05132122a93cbb988c56b164557f6bc6c367615baf751876642dd605aa2b6338031ed30e3050
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3908 WINWORD.EXE 3908 WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e6625525c973bb4304585038917d2a00691c56ce613f2f92b848d45238f3260e.doc" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:3908