Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 21:30
Behavioral task
behavioral1
Sample
9a446ca5a25d8afd854e4d039afe7237.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9a446ca5a25d8afd854e4d039afe7237.doc
Resource
win10v2004-20220812-en
General
-
Target
9a446ca5a25d8afd854e4d039afe7237.doc
-
Size
24KB
-
MD5
9a446ca5a25d8afd854e4d039afe7237
-
SHA1
c732df132205e8d493ec025e54d091591a880de8
-
SHA256
c128469224800285ee27bca88f7f560805c60a94feb7186dcf70e0ef9274ac59
-
SHA512
649b75f00e0bd50801c16b995f3483aa66f45c43ff26b10723efbd640d71096c22ba5c8233093dc48fb1eff75be0d9df7a4713c06a4d8df29a771947516fa62e
-
SSDEEP
192:U7EWzvcPawQM7vz0x69Y39WTp33EiRcx+NSZXKOVaXGqtOU0eJbUZSm+lW69k3La:U1wQkvz0kY39oVNzOVaXZoU00Hm+
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 5056 WINWORD.EXE 5056 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
WINWORD.EXEpid process 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9a446ca5a25d8afd854e4d039afe7237.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5056-132-0x00007FFB88250000-0x00007FFB88260000-memory.dmpFilesize
64KB
-
memory/5056-133-0x00007FFB88250000-0x00007FFB88260000-memory.dmpFilesize
64KB
-
memory/5056-134-0x00007FFB88250000-0x00007FFB88260000-memory.dmpFilesize
64KB
-
memory/5056-135-0x00007FFB88250000-0x00007FFB88260000-memory.dmpFilesize
64KB
-
memory/5056-136-0x00007FFB88250000-0x00007FFB88260000-memory.dmpFilesize
64KB
-
memory/5056-137-0x00007FFB85B30000-0x00007FFB85B40000-memory.dmpFilesize
64KB
-
memory/5056-138-0x00007FFB85B30000-0x00007FFB85B40000-memory.dmpFilesize
64KB