Analysis
-
max time kernel
183s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
d10697091f75fb01f0bbdc234b8cb5b70cf2dfd43ca63e07d9887a43afcf8115.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d10697091f75fb01f0bbdc234b8cb5b70cf2dfd43ca63e07d9887a43afcf8115.doc
Resource
win10v2004-20220812-en
General
-
Target
d10697091f75fb01f0bbdc234b8cb5b70cf2dfd43ca63e07d9887a43afcf8115.doc
-
Size
31KB
-
MD5
de475156edb7e6cfc4fdac351176304f
-
SHA1
3d3a9bcdad513c7a1550b8cd656c2e43d74ce8a9
-
SHA256
d10697091f75fb01f0bbdc234b8cb5b70cf2dfd43ca63e07d9887a43afcf8115
-
SHA512
0412700b5ad23f63a1b0e74beccd8a316b6cb22e09a946cc641454abcdea95f8df96c38bb2e72989d4df1908bfe6478ce5a89664a2da5a264c9058b37670570e
-
SSDEEP
192:Df5sCYYEmnrGIstIlNybkUyGc6rdRBwAEwfG4ZeniSZwkqstsdRm6+K:aDfntdkUyGcSxwAjLwi2sLZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4668 WINWORD.EXE 4668 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE 4668 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d10697091f75fb01f0bbdc234b8cb5b70cf2dfd43ca63e07d9887a43afcf8115.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4668