Analysis
-
max time kernel
142s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 08:45
Static task
static1
Behavioral task
behavioral1
Sample
26fc7a7b6961db8a65069fb0fea5917aacc90a0c55df18742684556f0420eb31.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
26fc7a7b6961db8a65069fb0fea5917aacc90a0c55df18742684556f0420eb31.doc
Resource
win10v2004-20220812-en
General
-
Target
26fc7a7b6961db8a65069fb0fea5917aacc90a0c55df18742684556f0420eb31.doc
-
Size
39KB
-
MD5
c785391d6358b90130ac80605fc6486a
-
SHA1
2fce6e9635a363a53b15198606c031e9b27fb5a7
-
SHA256
26fc7a7b6961db8a65069fb0fea5917aacc90a0c55df18742684556f0420eb31
-
SHA512
2825e8a532cf7e33efe9b90d0251c835b2b5a922e1f82dbc28b90736b1fef92d078ee8a39265dd51323ecf9a4f230985ab98182eac877104ac3a1e8da4fbeb82
-
SSDEEP
192:+YAM8uZQ7+52Ll5id3RZbOo+xSkT7pX0jrZ9htenNa4ja:A5LGrs7pX0jrtt+Na
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\~WRD0002.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1592 WINWORD.EXE 1592 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\26fc7a7b6961db8a65069fb0fea5917aacc90a0c55df18742684556f0420eb31.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1592