Analysis
-
max time kernel
204s -
max time network
233s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
323d1e3630b9595e293d9480eb90cebb1d6417aebb825a69dc08baaa58c26b46.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
323d1e3630b9595e293d9480eb90cebb1d6417aebb825a69dc08baaa58c26b46.doc
Resource
win10v2004-20221111-en
General
-
Target
323d1e3630b9595e293d9480eb90cebb1d6417aebb825a69dc08baaa58c26b46.doc
-
Size
362KB
-
MD5
8a699ac8531ea06b53cfc0f47c9183a7
-
SHA1
0b8db705e7b96826305b34d7ad25601ce98fe0e2
-
SHA256
323d1e3630b9595e293d9480eb90cebb1d6417aebb825a69dc08baaa58c26b46
-
SHA512
86ffacfe209a2c59da4fd4d38203740b357b81104a8e4e3585b40f9630bfb126177b5dd5294e86c3b9c492e360510aba095b763f9681ff6be648d9b1f6b0098c
-
SSDEEP
3072:plxnRYLVKHfsqP48BDPmp8mW2JxDYsFayKGQCuo/ZqRkk4FK30tw:plUJK/sAD4x3DtayKbCv/Z5230t
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4428 WINWORD.EXE 4428 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4428 WINWORD.EXE 4428 WINWORD.EXE 4428 WINWORD.EXE 4428 WINWORD.EXE 4428 WINWORD.EXE 4428 WINWORD.EXE 4428 WINWORD.EXE 4428 WINWORD.EXE 4428 WINWORD.EXE 4428 WINWORD.EXE 4428 WINWORD.EXE 4428 WINWORD.EXE 4428 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\323d1e3630b9595e293d9480eb90cebb1d6417aebb825a69dc08baaa58c26b46.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4428