Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
19-10-2021 05:29
Static task
static1
Behavioral task
behavioral1
Sample
RFQ PBMS 41697-STR-JAS-21 ENGINE STORES.doc
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFQ PBMS 41697-STR-JAS-21 ENGINE STORES.doc
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
RFQ PBMS 41697-STR-JAS-21 ENGINE STORES.doc
-
Size
84KB
-
MD5
212df1aef8f8b23361e9b0b385e6bc2e
-
SHA1
2b953ab7485560a0d645886d26b200c470b8bd6d
-
SHA256
cd9195a9fab06c84887945db107a1e2bf404cbbce9e28495e124cee656e98924
-
SHA512
e0c625a2bef55fe62817b2e338f2837a7f0f62c1b3fe1c001b6f73a4b83fe19e5573a357544c81620eaf4b050caf146eca5ca51d68852ebc55a7b24ca917b30e
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2196 WINWORD.EXE 2196 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 2196 WINWORD.EXE 2196 WINWORD.EXE 2196 WINWORD.EXE 2196 WINWORD.EXE 2196 WINWORD.EXE 2196 WINWORD.EXE 2196 WINWORD.EXE 2196 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RFQ PBMS 41697-STR-JAS-21 ENGINE STORES.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2196