Analysis
-
max time kernel
152s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 03:10
Behavioral task
behavioral1
Sample
5ίί.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5ίί.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
5ί̨.doc
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
5ί̨.doc
Resource
win10v2004-20221111-en
General
-
Target
5ί̨.doc
-
Size
122KB
-
MD5
988d2fc7bf4e80c4b243a24e4f8ad6e6
-
SHA1
eb8f43dd5c4ed2bafa23d7a88f1b2d361c257aa0
-
SHA256
515f0519775ec9eadb9df4a562eeb3313b7f3a1d2dad3604b31522c83de271c1
-
SHA512
051578e96b198b015c044e7fec4b8b98e595381ba10ca958223ea8d68215ae6a61aad6374eea07e4a2fb77d52ce76d0492f6c66ce8761dd1f4122773add5a89c
-
SSDEEP
384:G2GoF0F51mSaCNCaCyCaCTCTCzCwCwCwCRCxCxC2CWgfhR/s7oiqzR/YlN:Gc0czGpRp8cc//fyyy99gfH/syt/Y
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 396 WINWORD.EXE 396 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
WINWORD.EXEpid process 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE 396 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5ί̨.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/396-132-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmpFilesize
64KB
-
memory/396-133-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmpFilesize
64KB
-
memory/396-134-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmpFilesize
64KB
-
memory/396-135-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmpFilesize
64KB
-
memory/396-136-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmpFilesize
64KB
-
memory/396-137-0x00007FFB49200000-0x00007FFB49210000-memory.dmpFilesize
64KB
-
memory/396-138-0x00007FFB49200000-0x00007FFB49210000-memory.dmpFilesize
64KB
-
memory/396-140-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmpFilesize
64KB
-
memory/396-141-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmpFilesize
64KB
-
memory/396-142-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmpFilesize
64KB
-
memory/396-143-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmpFilesize
64KB