Analysis
-
max time kernel
205s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 21:42
Behavioral task
behavioral1
Sample
0baebe6b45f0df06ebf8f0c5e85ec813a9a1382e6aeb56f25abf891577338bef.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0baebe6b45f0df06ebf8f0c5e85ec813a9a1382e6aeb56f25abf891577338bef.doc
Resource
win10v2004-20221111-en
General
-
Target
0baebe6b45f0df06ebf8f0c5e85ec813a9a1382e6aeb56f25abf891577338bef.doc
-
Size
75KB
-
MD5
98cc65ede97e75f6e69afc22ca9bed9c
-
SHA1
40114416e7de4a50131d12f88ae198cdf30a52d0
-
SHA256
0baebe6b45f0df06ebf8f0c5e85ec813a9a1382e6aeb56f25abf891577338bef
-
SHA512
ce0d53698677f5744e564bf824ef66f2772d0dd27c963f715509e50a14e89eb145e22e714d45b8c5f1b37a957d2d4757bcb63290d212ca789d6cc89114fb825b
-
SSDEEP
768:Yq0qOVL9sXMtNAnpQUzv1CAPowxtLLR4vrpXI6joLFDzA:Yq0qOVMMt2KUsAPowR+pI6MhD
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\Wallpaper = "\\Jon.html" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 224 WINWORD.EXE 224 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE 224 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0baebe6b45f0df06ebf8f0c5e85ec813a9a1382e6aeb56f25abf891577338bef.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:224