Analysis
-
max time kernel
104s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 18:15
Static task
static1
Behavioral task
behavioral1
Sample
89ab77fd3eb3060fa10abfc611d02f5f954c31401a3e0a31b92d1522f61c8273.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89ab77fd3eb3060fa10abfc611d02f5f954c31401a3e0a31b92d1522f61c8273.doc
Resource
win10v2004-20220901-en
General
-
Target
89ab77fd3eb3060fa10abfc611d02f5f954c31401a3e0a31b92d1522f61c8273.doc
-
Size
416KB
-
MD5
0ab0452659627998508cbc820f261980
-
SHA1
c71e38ea7c15cf3630bc32b109757b122805868f
-
SHA256
89ab77fd3eb3060fa10abfc611d02f5f954c31401a3e0a31b92d1522f61c8273
-
SHA512
0c46f58daa65ea4ba99c96d84b80a8dfaa5c5d982a7bd524d8e6dc6143fdc16efb31fc37139997986780a8d3b3a4021be5bb3aa8896563f4a2648297fa4203ac
-
SSDEEP
6144:bvMRHlKM/2TB1lRFTtWMpL9/AyF6apRuNcua01XFHn3GbFBUJy:L++JQ0LpxhuNco1VXoBUJy
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3532 WINWORD.EXE 3532 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE 3532 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3532 wrote to memory of 3596 3532 WINWORD.EXE 85 PID 3532 wrote to memory of 3596 3532 WINWORD.EXE 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\89ab77fd3eb3060fa10abfc611d02f5f954c31401a3e0a31b92d1522f61c8273.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3596
-