Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 04:10
Static task
static1
Behavioral task
behavioral1
Sample
108212fda535826b198f5b57b0fa04ce9de4fdd9e9e01b815cb1aaad525b5e25.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
108212fda535826b198f5b57b0fa04ce9de4fdd9e9e01b815cb1aaad525b5e25.doc
Resource
win10v2004-20220414-en
General
-
Target
108212fda535826b198f5b57b0fa04ce9de4fdd9e9e01b815cb1aaad525b5e25.doc
-
Size
7KB
-
MD5
1f2b652d1eee9b2e5c2c9b00fc91be6c
-
SHA1
9731125389ad66c8ae1d2829f07deadb26970b1e
-
SHA256
108212fda535826b198f5b57b0fa04ce9de4fdd9e9e01b815cb1aaad525b5e25
-
SHA512
3a91125479493182f7ff0b3150f7f57218a56472966105a8928280d6a818e11b17df23c6b16abaa9766165dff20269a53f5eb84805f90bb2d2aee65a0a438af4
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1944 WINWORD.EXE 1944 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
Processes:
WINWORD.EXEpid process 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE 1944 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\108212fda535826b198f5b57b0fa04ce9de4fdd9e9e01b815cb1aaad525b5e25.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1944-130-0x00007FFA95C90000-0x00007FFA95CA0000-memory.dmpFilesize
64KB
-
memory/1944-131-0x00007FFA95C90000-0x00007FFA95CA0000-memory.dmpFilesize
64KB
-
memory/1944-132-0x00007FFA95C90000-0x00007FFA95CA0000-memory.dmpFilesize
64KB
-
memory/1944-133-0x00007FFA95C90000-0x00007FFA95CA0000-memory.dmpFilesize
64KB
-
memory/1944-134-0x00007FFA95C90000-0x00007FFA95CA0000-memory.dmpFilesize
64KB
-
memory/1944-135-0x00007FFA93A00000-0x00007FFA93A10000-memory.dmpFilesize
64KB
-
memory/1944-136-0x00007FFA93A00000-0x00007FFA93A10000-memory.dmpFilesize
64KB