Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 12:11
Behavioral task
behavioral1
Sample
6ac6c2ff6d5ca233d9b5162777cb83c60a3ee4d32b1e10346df2db85da8a0da1.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6ac6c2ff6d5ca233d9b5162777cb83c60a3ee4d32b1e10346df2db85da8a0da1.doc
Resource
win10v2004-20221111-en
General
-
Target
6ac6c2ff6d5ca233d9b5162777cb83c60a3ee4d32b1e10346df2db85da8a0da1.doc
-
Size
41KB
-
MD5
25c7e744eb17e9611a2f3b9b4cdec9ff
-
SHA1
a571afce819955957afaa6dd1757d42a6218e434
-
SHA256
6ac6c2ff6d5ca233d9b5162777cb83c60a3ee4d32b1e10346df2db85da8a0da1
-
SHA512
5522e554a8b94bf8c7db29501e93a22445f7e8d147cf86a9783bed599505e67e0abc10877f19447200c81e48fad22c2089714accc05b853e8852e8eb2b119b76
-
SSDEEP
384:llMZ6AgwBjiSeav9LyGmDihsUYs64Ctjd/FGsnX0j2A2UuVfmQCatWD:TTAF9LTmisls6vBdZc
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 5084 WINWORD.EXE 5084 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
WINWORD.EXEpid process 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE 5084 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6ac6c2ff6d5ca233d9b5162777cb83c60a3ee4d32b1e10346df2db85da8a0da1.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5084