Analysis
-
max time kernel
120s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:38
Static task
static1
Behavioral task
behavioral1
Sample
PO 22-425.rtf
Resource
win7-20220812-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
PO 22-425.rtf
Resource
win10v2004-20220901-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
PO 22-425.rtf
-
Size
23KB
-
MD5
fc3c8f87f712820eb67c9fedcf3753d5
-
SHA1
35d27b6e305aaa9fb3b35d325608c21f4c55d380
-
SHA256
7e02cb1039c0c89b5eb20a3f6a1314251ac7a0d9d5304bcc65d779a082e7d32f
-
SHA512
d1ee732570caf8fec7f2cabd9beea2c084e954b178d85a3a17d8ee7e8014ff854dc599ec58b60b653f93bcfda259c1a655046c3c7a4cf4b78be12bc892514cb7
-
SSDEEP
384:kQMmdOFNYY0aaaIswqPeOrka1+fHQJ+t3rQkRhZuq93Fs/wvTRG6bJTVdMS/g:wFx0XaIsnPRIa4fwJMS/wvTRG6bJrMx
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 5080 WINWORD.EXE 5080 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 5080 WINWORD.EXE 5080 WINWORD.EXE 5080 WINWORD.EXE 5080 WINWORD.EXE 5080 WINWORD.EXE 5080 WINWORD.EXE 5080 WINWORD.EXE 5080 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PO 22-425.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5080