Analysis
-
max time kernel
137s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
1d8ff89989b94019b45f39f941b02f72aa36f58c379115c78adbabb5f1c3216d.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1d8ff89989b94019b45f39f941b02f72aa36f58c379115c78adbabb5f1c3216d.doc
Resource
win10v2004-20220812-en
General
-
Target
1d8ff89989b94019b45f39f941b02f72aa36f58c379115c78adbabb5f1c3216d.doc
-
Size
19KB
-
MD5
2b401ac616705ccc485352d87698ee3a
-
SHA1
a1f7736f31592a05bb7693e31857d0f6580662f2
-
SHA256
1d8ff89989b94019b45f39f941b02f72aa36f58c379115c78adbabb5f1c3216d
-
SHA512
f2c20071a2d3ecd763f581191d2d7578df0a3e493def6a8882048a62a978796cedfd17a53d9eee7ea66e80eb7b5a326cc2b85651754a6825b5fcae0bf4151728
-
SSDEEP
48:rjTZioFlNZNkz/4cH7XHkzXVqLXLMP0zy11OuCQvI4owuUBR8snR91FzOrAWz:JPrkz/4cHLEELMFCRVwxIsnR91Rqz
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1664 WINWORD.EXE 1664 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1d8ff89989b94019b45f39f941b02f72aa36f58c379115c78adbabb5f1c3216d.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1664