Analysis
-
max time kernel
199s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 21:27
Behavioral task
behavioral1
Sample
9a0e6af473484c183dafbb3c29fc91bf.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9a0e6af473484c183dafbb3c29fc91bf.doc
Resource
win10v2004-20221111-en
General
-
Target
9a0e6af473484c183dafbb3c29fc91bf.doc
-
Size
2.4MB
-
MD5
9a0e6af473484c183dafbb3c29fc91bf
-
SHA1
5f573156ba09334570e2256956502dddda0df03f
-
SHA256
0d844e0b429813d9d18cca304b0719a1a6ec4de65702fc96580018344a9eae29
-
SHA512
9e2ec5151fbf5f94dfc418edfb4f38df7b997abcb44866570bfa371997e48342c024f69a464123e6191369313d7c4fd8b5a4f85083d7c453b913f5d689b7bcd6
-
SSDEEP
24576:SntBDIDBw5oBpNYWYcGQL6cYjxp/+2Lt4KYHkyY4t1sGXgZM:kBDuBw5kkcrLCvaD
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4520 WINWORD.EXE 4520 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 18 IoCs
Processes:
WINWORD.EXEpid process 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9a0e6af473484c183dafbb3c29fc91bf.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4520-132-0x00007FFD4F230000-0x00007FFD4F240000-memory.dmpFilesize
64KB
-
memory/4520-133-0x00007FFD4F230000-0x00007FFD4F240000-memory.dmpFilesize
64KB
-
memory/4520-134-0x00007FFD4F230000-0x00007FFD4F240000-memory.dmpFilesize
64KB
-
memory/4520-135-0x00007FFD4F230000-0x00007FFD4F240000-memory.dmpFilesize
64KB
-
memory/4520-136-0x00007FFD4F230000-0x00007FFD4F240000-memory.dmpFilesize
64KB
-
memory/4520-137-0x00007FFD4D0A0000-0x00007FFD4D0B0000-memory.dmpFilesize
64KB
-
memory/4520-138-0x00007FFD4D0A0000-0x00007FFD4D0B0000-memory.dmpFilesize
64KB