Analysis
-
max time kernel
163s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 04:12
Static task
static1
Behavioral task
behavioral1
Sample
cb922894e59f39993c948451c4cfe52ca86f119c402b9ea97a12f85f9ea7a324.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cb922894e59f39993c948451c4cfe52ca86f119c402b9ea97a12f85f9ea7a324.doc
Resource
win10v2004-20220414-en
General
-
Target
cb922894e59f39993c948451c4cfe52ca86f119c402b9ea97a12f85f9ea7a324.doc
-
Size
154KB
-
MD5
e88a35275afb414f6684a29d837ec274
-
SHA1
cc5e189dfd12d62c29625d97cffbab4e9438ad2a
-
SHA256
cb922894e59f39993c948451c4cfe52ca86f119c402b9ea97a12f85f9ea7a324
-
SHA512
b5f11e400fb40b1fd65994b120b9bac06bf22c843b6a9df820792a0bc69d05bf2f46e14f163ae1586e34133f3415d0ac38cf810ee9f8b5a43b941f489be9d0f6
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4948 WINWORD.EXE 4948 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
Processes:
WINWORD.EXEpid process 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\cb922894e59f39993c948451c4cfe52ca86f119c402b9ea97a12f85f9ea7a324.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4948-130-0x00007FFA65B10000-0x00007FFA65B20000-memory.dmpFilesize
64KB
-
memory/4948-131-0x00007FFA65B10000-0x00007FFA65B20000-memory.dmpFilesize
64KB
-
memory/4948-132-0x00007FFA65B10000-0x00007FFA65B20000-memory.dmpFilesize
64KB
-
memory/4948-133-0x00007FFA65B10000-0x00007FFA65B20000-memory.dmpFilesize
64KB
-
memory/4948-134-0x00007FFA65B10000-0x00007FFA65B20000-memory.dmpFilesize
64KB
-
memory/4948-135-0x00007FFA63940000-0x00007FFA63950000-memory.dmpFilesize
64KB
-
memory/4948-136-0x00007FFA63940000-0x00007FFA63950000-memory.dmpFilesize
64KB