Analysis
-
max time kernel
192s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 21:26
Behavioral task
behavioral1
Sample
4b900db781c9f6aa48b317f4191a5cbc.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b900db781c9f6aa48b317f4191a5cbc.doc
Resource
win10v2004-20221111-en
General
-
Target
4b900db781c9f6aa48b317f4191a5cbc.doc
-
Size
57KB
-
MD5
4b900db781c9f6aa48b317f4191a5cbc
-
SHA1
102cb1fb5f5aa04b130cb6600ce8720067526e33
-
SHA256
d356ea600c437be49b80d94ab3b2e3f08981b0ed882288ba6fda30720126fc32
-
SHA512
d5fd8272f2fd634608aa43d2efe80cf50e7ac4c34e68c26129c12c8ff28a3ab7aeaef7befa5143f7a2d9a5aedd070d663bd4fbdfcbac40a0d689f5762a1bbcce
-
SSDEEP
1536:ru00EDKveJ5Da9ySltBmwtUBfFwI5wmyOqzJa:ru0vDKc5Da9llFUBKI5wmyOqzJa
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3572 WINWORD.EXE 3572 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
WINWORD.EXEpid process 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4b900db781c9f6aa48b317f4191a5cbc.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3572