Analysis
-
max time kernel
114s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2022 03:04
Static task
static1
Behavioral task
behavioral1
Sample
d9e010208052f83ed111ca2619a89a9cee3af63dd96dcb317c2534bd5c5b304a.docx
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d9e010208052f83ed111ca2619a89a9cee3af63dd96dcb317c2534bd5c5b304a.docx
Resource
win10v2004-20220812-en
General
-
Target
d9e010208052f83ed111ca2619a89a9cee3af63dd96dcb317c2534bd5c5b304a.docx
-
Size
68KB
-
MD5
b34a1c8af20f5f22588bce05b583273f
-
SHA1
df73957c1aebf2af3215c58fe71c6e2e598bdaea
-
SHA256
d9e010208052f83ed111ca2619a89a9cee3af63dd96dcb317c2534bd5c5b304a
-
SHA512
4169934b356f8c890f9d38224c90956ac36c6c353d15e147d3030b993270d454844a9f0d8b3fa8e9912ec08920c27946545b05a8347bcedbbb495bf5872ab3fe
-
SSDEEP
1536:PFrmmDJDYqKAc7ngMh8Ztgotu58oMMcNEeQO:PFrmmDJGAc8C8ZGeoMMcuY
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1152 WINWORD.EXE 1152 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1152 WINWORD.EXE 1152 WINWORD.EXE 1152 WINWORD.EXE 1152 WINWORD.EXE 1152 WINWORD.EXE 1152 WINWORD.EXE 1152 WINWORD.EXE 1152 WINWORD.EXE 1152 WINWORD.EXE 1152 WINWORD.EXE 1152 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d9e010208052f83ed111ca2619a89a9cee3af63dd96dcb317c2534bd5c5b304a.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1152