Analysis
-
max time kernel
101s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/10/2022, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
d07a50704f992dc136e33de8dbb037c6475360f915e42d33f85b873b7a157eea.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d07a50704f992dc136e33de8dbb037c6475360f915e42d33f85b873b7a157eea.doc
Resource
win10v2004-20220812-en
General
-
Target
d07a50704f992dc136e33de8dbb037c6475360f915e42d33f85b873b7a157eea.doc
-
Size
64KB
-
MD5
67668712d5efeb87471704cacbf89451
-
SHA1
f5b7be981c7d58bd93d97cd4e2ad3f35b5c97d75
-
SHA256
d07a50704f992dc136e33de8dbb037c6475360f915e42d33f85b873b7a157eea
-
SHA512
ba2542cad7a08f323ee4cc9b6463378603c84b6fdcc3514f8228d66715a6005a5954cd5c38c4b35636ee5a8282f32e3fb34810ac0a86eb00dfa54b2c6cc93e65
-
SSDEEP
1536:HKgxouii/4ii/Aii/sii/Hii/3ii/9lB1:q0ouii/4ii/Aii/sii/Hii/3ii/nB1
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4860 WINWORD.EXE 4860 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE 4860 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d07a50704f992dc136e33de8dbb037c6475360f915e42d33f85b873b7a157eea.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4860