Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 21:26
Behavioral task
behavioral1
Sample
8d7ba6a49555b8ad4026c881dc805198.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d7ba6a49555b8ad4026c881dc805198.doc
Resource
win10v2004-20220901-en
General
-
Target
8d7ba6a49555b8ad4026c881dc805198.doc
-
Size
83KB
-
MD5
8d7ba6a49555b8ad4026c881dc805198
-
SHA1
f7bd8deb05c3311c294d8200e37c4f76ade593db
-
SHA256
094f3820e49599298e5155ddcdd08083932b60920ef326d537d1e7d0476a853a
-
SHA512
992d2b916a620bc0f5f42fe50cfe026f6fbd6f24ed0383af986fffe92595a54d24c8de9726bb36c53425f012268acca4c2113be4ef592af76a36dd82a2304789
-
SSDEEP
768:7DVs3+I/M7u96W0+PPjY30000JMH8QfMJDenNBJj/r+OYIVDELUPPPPPPPPPPPPM:XhGMC8W4k5NDYIVoLtfi6zD
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3036 WINWORD.EXE 3036 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 18 IoCs
Processes:
WINWORD.EXEpid process 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8d7ba6a49555b8ad4026c881dc805198.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3036