Analysis
-
max time kernel
165s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 06:24
Behavioral task
behavioral1
Sample
927c8c01f690c843f2789e1c87b481cc751dbfc0d52b8aebd7b171c0ba20aacf.docm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
927c8c01f690c843f2789e1c87b481cc751dbfc0d52b8aebd7b171c0ba20aacf.docm
Resource
win10v2004-20220812-en
General
-
Target
927c8c01f690c843f2789e1c87b481cc751dbfc0d52b8aebd7b171c0ba20aacf.docm
-
Size
32KB
-
MD5
0cc506b638d108e79a06a53c2165e7d0
-
SHA1
d2900a891af49676ea79e9e8504b1a0595653a8c
-
SHA256
927c8c01f690c843f2789e1c87b481cc751dbfc0d52b8aebd7b171c0ba20aacf
-
SHA512
f0607617be56a0514052fb56735bf992c6ecc711e41c027f0852b2fe7ab4577959c15f35086ce663d9d063e9d64f0596087e7a86e6acf22633cdcf36cdc97527
-
SSDEEP
768:b+NPahH9yzomoyJ9O0VKeRP5gQm3mkPf9CMMivWGJI:biwmo+k0rRPiQgDsMIGW
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1468 WINWORD.EXE 1468 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\927c8c01f690c843f2789e1c87b481cc751dbfc0d52b8aebd7b171c0ba20aacf.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1468