Analysis
-
max time kernel
192s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 18:59
Static task
static1
Behavioral task
behavioral1
Sample
77484e0dd4796cf147355784a87308945b26881a951c67cff1102a9559ff65c7.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
77484e0dd4796cf147355784a87308945b26881a951c67cff1102a9559ff65c7.doc
Resource
win10v2004-20220812-en
General
-
Target
77484e0dd4796cf147355784a87308945b26881a951c67cff1102a9559ff65c7.doc
-
Size
27KB
-
MD5
325f3832c234495b24a66a93ba6c0bbe
-
SHA1
fc310800451552a7d15f94bdba7f7aecbec37db2
-
SHA256
77484e0dd4796cf147355784a87308945b26881a951c67cff1102a9559ff65c7
-
SHA512
1af05a85d07365043d112b3c19ce6defcdf01ea3b1d1f004d677a6c02e7b6e045b532a81a0d8908d3a922fa6773db8b0d38b1d2f27c1604c147dc95b2fdc30f2
-
SSDEEP
192:HdEvdNm+F34l6+ejsdzMRFtG7bASsYGoh0ZwkqF0apdRmHanDA:YdN/FzQdzFASH7uEL
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2100 WINWORD.EXE 2100 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2100 WINWORD.EXE 2100 WINWORD.EXE 2100 WINWORD.EXE 2100 WINWORD.EXE 2100 WINWORD.EXE 2100 WINWORD.EXE 2100 WINWORD.EXE 2100 WINWORD.EXE 2100 WINWORD.EXE 2100 WINWORD.EXE 2100 WINWORD.EXE 2100 WINWORD.EXE 2100 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\77484e0dd4796cf147355784a87308945b26881a951c67cff1102a9559ff65c7.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2100