Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 03:51
Static task
static1
Behavioral task
behavioral1
Sample
e9d8bba06a47227ac1a560560522f427e9c4d622c7e1178ef4b9b255a1722a66.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e9d8bba06a47227ac1a560560522f427e9c4d622c7e1178ef4b9b255a1722a66.doc
Resource
win10v2004-20220414-en
General
-
Target
e9d8bba06a47227ac1a560560522f427e9c4d622c7e1178ef4b9b255a1722a66.doc
-
Size
5KB
-
MD5
9d0a35c66708bb21fe651db9081bb912
-
SHA1
f25775ca84e15349535b560949f0490421b3aa7b
-
SHA256
e9d8bba06a47227ac1a560560522f427e9c4d622c7e1178ef4b9b255a1722a66
-
SHA512
34138df9050ac77ef1040163e2ccc507c1edf5f2a199fcf08f04b55648a47b875196b412add1ed9364fb4cc7c5245d5b332b5190ede73f86e05b923adfdaee64
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3248 WINWORD.EXE 3248 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
Processes:
WINWORD.EXEpid process 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE 3248 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e9d8bba06a47227ac1a560560522f427e9c4d622c7e1178ef4b9b255a1722a66.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3248-130-0x00007FFEDB450000-0x00007FFEDB460000-memory.dmpFilesize
64KB
-
memory/3248-131-0x00007FFEDB450000-0x00007FFEDB460000-memory.dmpFilesize
64KB
-
memory/3248-132-0x00007FFEDB450000-0x00007FFEDB460000-memory.dmpFilesize
64KB
-
memory/3248-133-0x00007FFEDB450000-0x00007FFEDB460000-memory.dmpFilesize
64KB
-
memory/3248-134-0x00007FFEDB450000-0x00007FFEDB460000-memory.dmpFilesize
64KB
-
memory/3248-135-0x00007FFED8E40000-0x00007FFED8E50000-memory.dmpFilesize
64KB
-
memory/3248-136-0x00007FFED8E40000-0x00007FFED8E50000-memory.dmpFilesize
64KB