Analysis
-
max time kernel
110s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 05:15
Static task
static1
Behavioral task
behavioral1
Sample
5370e01b1daa137f6fef64b6aa92596863e7dc3ac56dcb85874ecdfd8c152877.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5370e01b1daa137f6fef64b6aa92596863e7dc3ac56dcb85874ecdfd8c152877.doc
Resource
win10v2004-20220901-en
General
-
Target
5370e01b1daa137f6fef64b6aa92596863e7dc3ac56dcb85874ecdfd8c152877.doc
-
Size
25KB
-
MD5
ff1b8d8fc3d635533b5b766e59b50ca1
-
SHA1
8c2787bf0990b5003e4dcc074ffa2064539c7c89
-
SHA256
5370e01b1daa137f6fef64b6aa92596863e7dc3ac56dcb85874ecdfd8c152877
-
SHA512
fcf200c21e56d3ec07a4fcef07e8146d5ee71b1e6be0c8449e3e1c634acd656b7ddfc15ea258413c350dcb17bcbb3006799d3b21f97ef0bb2c5ee0939da1e7ad
-
SSDEEP
96:P/2PBoBIidu77ugH7Y2cMLPh3uStmJtnSjTMXqabJYaYVuh0fVAMyq9hY/ez:P/2PBo1C7Fnblk72wXLbJYaYVuhiAR
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2496 WINWORD.EXE 2496 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE 2496 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5370e01b1daa137f6fef64b6aa92596863e7dc3ac56dcb85874ecdfd8c152877.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2496