Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 04:12
Static task
static1
Behavioral task
behavioral1
Sample
c2b89117e4f6bf48e20c4d2af9d26edfdad737411d453fbd62c7356be200ff5f.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c2b89117e4f6bf48e20c4d2af9d26edfdad737411d453fbd62c7356be200ff5f.doc
Resource
win10v2004-20220414-en
General
-
Target
c2b89117e4f6bf48e20c4d2af9d26edfdad737411d453fbd62c7356be200ff5f.doc
-
Size
16KB
-
MD5
0dc62f3171319014c5170d66aff86233
-
SHA1
9b5f876bf03c85ff5ec684b69342c40a45ec34da
-
SHA256
c2b89117e4f6bf48e20c4d2af9d26edfdad737411d453fbd62c7356be200ff5f
-
SHA512
bb496dfdb9b8fecbce2e80931901610747c0049bb8885b57d8f5ae0e3bb40ac15e07b4879a6ff06c29f0f7330d52ac7962e0b8a06d0ba066466e9c6aed2ad6e3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4464 WINWORD.EXE 4464 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
Processes:
WINWORD.EXEpid process 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE 4464 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c2b89117e4f6bf48e20c4d2af9d26edfdad737411d453fbd62c7356be200ff5f.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4464-130-0x00007FFB5AB90000-0x00007FFB5ABA0000-memory.dmpFilesize
64KB
-
memory/4464-132-0x00007FFB5AB90000-0x00007FFB5ABA0000-memory.dmpFilesize
64KB
-
memory/4464-131-0x00007FFB5AB90000-0x00007FFB5ABA0000-memory.dmpFilesize
64KB
-
memory/4464-133-0x00007FFB5AB90000-0x00007FFB5ABA0000-memory.dmpFilesize
64KB
-
memory/4464-134-0x00007FFB5AB90000-0x00007FFB5ABA0000-memory.dmpFilesize
64KB
-
memory/4464-135-0x00007FFB58B30000-0x00007FFB58B40000-memory.dmpFilesize
64KB
-
memory/4464-136-0x00007FFB58B30000-0x00007FFB58B40000-memory.dmpFilesize
64KB