Analysis
-
max time kernel
101s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2022 14:50
Static task
static1
Behavioral task
behavioral1
Sample
4cd31952aac8d43d01f873ea5c078f00ba5aca97f309c0169cac8abb9f77da60.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4cd31952aac8d43d01f873ea5c078f00ba5aca97f309c0169cac8abb9f77da60.doc
Resource
win10v2004-20220812-en
General
-
Target
4cd31952aac8d43d01f873ea5c078f00ba5aca97f309c0169cac8abb9f77da60.doc
-
Size
1.1MB
-
MD5
c488987903c12e4db543f19a861ceb26
-
SHA1
96bdd488a62e21bcfb46ad57d8316fba066f7129
-
SHA256
4cd31952aac8d43d01f873ea5c078f00ba5aca97f309c0169cac8abb9f77da60
-
SHA512
73dacb3569d9efd67b22323a7168ff92e45d05407f29b6624ee7f8563a3899ef9b8b50a315967c34eb0a3792d9879c85f5bec5247756e9532804403f71ea3acd
-
SSDEEP
24576:vS681SHVC4apRbQct2Jn4OX3mWwV7XbWu4rjFSg58Kl6IA86b:vAB4eac+4OX3mWwV7XbWu4rjFSg58Kl8
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2412 WINWORD.EXE 2412 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE 2412 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4cd31952aac8d43d01f873ea5c078f00ba5aca97f309c0169cac8abb9f77da60.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2412