Analysis
-
max time kernel
298s -
max time network
198s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25/10/2022, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
45f293b1b5a4aaec48ac943696302bac9c893867f1fc282e85ed8341dd2f0f50.docm
Resource
win10-20220812-en
7 signatures
300 seconds
General
-
Target
45f293b1b5a4aaec48ac943696302bac9c893867f1fc282e85ed8341dd2f0f50.docm
-
Size
143KB
-
MD5
f769f67681707e8f69ecdf9e62fb944c
-
SHA1
c5f6a48fa52a279e1f3424b97662b479716229af
-
SHA256
45f293b1b5a4aaec48ac943696302bac9c893867f1fc282e85ed8341dd2f0f50
-
SHA512
779caa9c7efac57edc6078d212b04a930d66fa10b50967bb1b9131c9e240f40f09e6f81812583770e7ffac51d7d0e23b57e20e6a7719d73ab2f1673cb17943a9
-
SSDEEP
3072:2e3HSOTf6Mqfb041n8Vj9SmUNRzw16vDhLfByVBZsqnCVL:2eiObpS1nY9fqzjvDZoDsqngL
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3540 WINWORD.EXE 3540 WINWORD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1580 mmc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe Token: 33 1580 mmc.exe Token: SeIncBasePriorityPrivilege 1580 mmc.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 3540 WINWORD.EXE 3540 WINWORD.EXE 3540 WINWORD.EXE 3540 WINWORD.EXE 3540 WINWORD.EXE 3540 WINWORD.EXE 3540 WINWORD.EXE 3540 WINWORD.EXE 3540 WINWORD.EXE 3540 WINWORD.EXE 3540 WINWORD.EXE 3540 WINWORD.EXE 1580 mmc.exe 1580 mmc.exe 1580 mmc.exe 1580 mmc.exe 1580 mmc.exe 3540 WINWORD.EXE 3540 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\45f293b1b5a4aaec48ac943696302bac9c893867f1fc282e85ed8341dd2f0f50.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3540
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1580