Analysis
-
max time kernel
137s -
max time network
130s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-03-2021 19:36
Behavioral task
behavioral1
Sample
Annexe modification sectorisation scolaire élémentaire.d oc.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Annexe modification sectorisation scolaire élémentaire.d oc.doc
Resource
win10v20201028
General
-
Target
Annexe modification sectorisation scolaire élémentaire.d oc.doc
-
Size
34KB
-
MD5
12721f5f36438344df79a8032a1f9cf3
-
SHA1
8d44f347bd421ca9cc0d8313c2882cb7a4f7c4ba
-
SHA256
ecdc9991474a686f3d6c7a379728180754586c651a140d695cb0cf828a64348e
-
SHA512
f99a80e0a9c8804ae03dd443443bff529e882773400151a3110ae475afe5176fa615c736ded3d3f7b1ae05f9286f388b7cbf680086f9d1285ff2cef7b11df948
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4764 WINWORD.EXE 4764 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Annexe modification sectorisation scolaire élémentaire.d oc.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4764-2-0x00007FF91BD80000-0x00007FF91BD90000-memory.dmpFilesize
64KB
-
memory/4764-3-0x00007FF91BD80000-0x00007FF91BD90000-memory.dmpFilesize
64KB
-
memory/4764-4-0x00007FF91BD80000-0x00007FF91BD90000-memory.dmpFilesize
64KB
-
memory/4764-5-0x00007FF942070000-0x00007FF9426A7000-memory.dmpFilesize
6.2MB
-
memory/4764-6-0x00007FF91BD80000-0x00007FF91BD90000-memory.dmpFilesize
64KB