Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 09:05
Behavioral task
behavioral1
Sample
f25dcc4f78ebf1fb7ad80f4a5b0d537c42fe1fbed6fd8b6cfef1d79e370a1d03.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f25dcc4f78ebf1fb7ad80f4a5b0d537c42fe1fbed6fd8b6cfef1d79e370a1d03.doc
Resource
win10v2004-20221111-en
General
-
Target
f25dcc4f78ebf1fb7ad80f4a5b0d537c42fe1fbed6fd8b6cfef1d79e370a1d03.doc
-
Size
19KB
-
MD5
2241b79a39cdbc5d260a8ee939537623
-
SHA1
ce82263e71f47a3fddd0e165f8329e8b264bb0cc
-
SHA256
f25dcc4f78ebf1fb7ad80f4a5b0d537c42fe1fbed6fd8b6cfef1d79e370a1d03
-
SHA512
c74b595696372080b240564ab9392dc26c6e64f44703c229e9385eee5e8cd9f5aa54b28844063d1d1485bb77482620c073cba23a85e7c6430157d3979e5394ed
-
SSDEEP
192:7iZUl5rdasqHZ84kzjcDnhKgTcLt3cErWtmsij+Etvu/D4N/Fax:7oVZPYcbECUKDtmsiCEVu/Q
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3068 WINWORD.EXE 3068 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE 3068 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f25dcc4f78ebf1fb7ad80f4a5b0d537c42fe1fbed6fd8b6cfef1d79e370a1d03.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3068