Analysis
-
max time kernel
134s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
5c55768eb9dcb66094518809626172f0022c83358caeb7a31d1f885860980700.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5c55768eb9dcb66094518809626172f0022c83358caeb7a31d1f885860980700.doc
Resource
win10v2004-20220812-en
General
-
Target
5c55768eb9dcb66094518809626172f0022c83358caeb7a31d1f885860980700.doc
-
Size
53KB
-
MD5
756fad7878cb4cc76488c73e99f4e7f0
-
SHA1
ffec6b246f35bf62935743d3f7f15f9dbe96d171
-
SHA256
5c55768eb9dcb66094518809626172f0022c83358caeb7a31d1f885860980700
-
SHA512
d0813959b5884a39f753b1574ed15b276157674e59ef596a84e5800c6ebb01fb8ccde592777802bf81ab5a7ef13596dd416ca5d957b7e22d809a82d207684b5d
-
SSDEEP
384:2jbu+zS9FEjDVooeJbr8Ysv8snMsRpi0slmY3a0AjYwKh:au+zmFYVoLrqHp2lLcYL
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5056 WINWORD.EXE 5056 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE 5056 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5c55768eb9dcb66094518809626172f0022c83358caeb7a31d1f885860980700.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5056