Analysis
-
max time kernel
99s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2022 04:32
Static task
static1
Behavioral task
behavioral1
Sample
35872a514bf6eb303cbee0ae28002222ccc9e2bf8aaf4d77c1f9e5df15d94cd3.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35872a514bf6eb303cbee0ae28002222ccc9e2bf8aaf4d77c1f9e5df15d94cd3.doc
Resource
win10v2004-20220812-en
General
-
Target
35872a514bf6eb303cbee0ae28002222ccc9e2bf8aaf4d77c1f9e5df15d94cd3.doc
-
Size
1.7MB
-
MD5
e011b77bb4a31116ff115175a8ea1801
-
SHA1
e3c8f77a3cddd2a27987988cec99b64955ecd0e1
-
SHA256
35872a514bf6eb303cbee0ae28002222ccc9e2bf8aaf4d77c1f9e5df15d94cd3
-
SHA512
ac52f15d98077c474fe395bfb730f31325212b05de186febcd416324630992736fc1a5fe50b6a9f9aeb55e0c289fbc438fb1509868871ef87136f02e415cc31f
-
SSDEEP
49152:UUmECKv+PmeE4jRHvVYXGpDA1ASGqsJNodJNo:U3xKWo4jR9YXaCAShYeHe
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4692 WINWORD.EXE 4692 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\35872a514bf6eb303cbee0ae28002222ccc9e2bf8aaf4d77c1f9e5df15d94cd3.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4692