Analysis
-
max time kernel
152s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 21:04
Static task
static1
Behavioral task
behavioral1
Sample
壨/20141119_101200_2.jpg
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
壨/20141119_101200_2.jpg
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
壨/FTTHַϵ�.xls
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
壨/FTTHַϵ�.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
壨/FTTH··Ϣ -.xls
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
壨/FTTH··Ϣ -.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
壨/.doc
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
壨/.doc
Resource
win10v2004-20221111-en
General
-
Target
壨/.doc
-
Size
11KB
-
MD5
32d59be4e432ed200f9c25a9d23841ff
-
SHA1
f866379086832615aeb06b111e8e75cf8402b2b2
-
SHA256
dd681a73db5f95680875475024c99136d216173224e8e2808bb7700209ed6194
-
SHA512
1d7331f8c9554b2690bdc53c87ed2ed62035fc118b578c2f1532db75d17cc4c34fd478363890a92f393c2973bcf272f3927e13dad0ecc93f0464d8d18b9f9fe8
-
SSDEEP
96:E8eU8hU+qUohEA1P9hh6a8ZM+SkCJfO3XAky1nwH5R:Ej6+qUy3PHh6FZM+s0Q/1wb
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1700 WINWORD.EXE 1700 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\壨\.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1700