Analysis
-
max time kernel
169s -
max time network
233s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:02
Static task
static1
Behavioral task
behavioral1
Sample
SURENDER BL.rtf
Resource
win7-20220812-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
SURENDER BL.rtf
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
SURENDER BL.rtf
-
Size
24KB
-
MD5
12f7492e0b937a3e8eda18950bb84d23
-
SHA1
4d92fd377c76c764057564a2bc208f6db7ec88c2
-
SHA256
1a656f17d0145cb825fb192f30b3ea8a40478bf0225e7d64ff0059bfba7473ab
-
SHA512
9e4ac55c83d986c5379c02b6ae786cdd4e369ea8b022e53a81843ffd1a968136a9c0c3bef8439a6834c439636f3a35bec0fe55a3bf7e844c08c2b5429ecb17d2
-
SSDEEP
384:cQMmdOFNYY0aaaIswqPeOrka1+fHQJ+t3rQkRhZV53GflpBLxvpkAmwzPlglFgf0:YFx0XaIsnPRIa4fwJM1GZkAtzPWga9
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2272 WINWORD.EXE 2272 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2272 WINWORD.EXE 2272 WINWORD.EXE 2272 WINWORD.EXE 2272 WINWORD.EXE 2272 WINWORD.EXE 2272 WINWORD.EXE 2272 WINWORD.EXE 2272 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SURENDER BL.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2272