Analysis
-
max time kernel
175s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 23:48
Static task
static1
Behavioral task
behavioral1
Sample
c6ebcb728f4ddb33128db2b5dcee30806b5817bf08e8cf3195fdee4eb578dcbc.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6ebcb728f4ddb33128db2b5dcee30806b5817bf08e8cf3195fdee4eb578dcbc.doc
Resource
win10v2004-20221111-en
General
-
Target
c6ebcb728f4ddb33128db2b5dcee30806b5817bf08e8cf3195fdee4eb578dcbc.doc
-
Size
22KB
-
MD5
0cca43d419dbef948176dc6db7c1d4b6
-
SHA1
316e8abcf92b7db83df61fa68991397a395c51a8
-
SHA256
c6ebcb728f4ddb33128db2b5dcee30806b5817bf08e8cf3195fdee4eb578dcbc
-
SHA512
776c047b417bb41c3a850a44ecff7f162de027e166280cbea7b216abc2d256d8bba2ce5fa3469136431cbcc69ccb24db900923cd7b6373198dbaab5e0b96afef
-
SSDEEP
192:MQUN9/lhtBrSXt0fDLOjHYIYAFtOgB6T:lMRxY90fDLwHYIYm
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1632 WINWORD.EXE 1632 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1632 WINWORD.EXE 1632 WINWORD.EXE 1632 WINWORD.EXE 1632 WINWORD.EXE 1632 WINWORD.EXE 1632 WINWORD.EXE 1632 WINWORD.EXE 1632 WINWORD.EXE 1632 WINWORD.EXE 1632 WINWORD.EXE 1632 WINWORD.EXE 1632 WINWORD.EXE 1632 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c6ebcb728f4ddb33128db2b5dcee30806b5817bf08e8cf3195fdee4eb578dcbc.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1632