Analysis
-
max time kernel
124s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 05:05
Static task
static1
Behavioral task
behavioral1
Sample
50962280702c6d62479add6d5b3c0766a815a380ef2f98b9b41effdd44f084d0.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
50962280702c6d62479add6d5b3c0766a815a380ef2f98b9b41effdd44f084d0.doc
Resource
win10v2004-20220901-en
General
-
Target
50962280702c6d62479add6d5b3c0766a815a380ef2f98b9b41effdd44f084d0.doc
-
Size
1.4MB
-
MD5
fb9768ee0c000c6e8e685a5648aa4b4b
-
SHA1
d68c6b68ee364320a05917d565e5bd416a013cb0
-
SHA256
50962280702c6d62479add6d5b3c0766a815a380ef2f98b9b41effdd44f084d0
-
SHA512
0bd2db2197a5b42a6a221f411556ab7d5ca700ac40f6a47115370a1c20458eafa9072dc5f988adfff8ae03c0db8dd185115c8b42b9efd242cb2fbba689ed8c64
-
SSDEEP
24576:qP6nGB7FXJ4wzZKdG4oIzsQd4hsA/UIbwrf1c77dg77k3paUQI38f:U6nGBLNzZKLdmhV/UIbwrf+77dg77k3L
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4980 WINWORD.EXE 4980 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 5104 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\50962280702c6d62479add6d5b3c0766a815a380ef2f98b9b41effdd44f084d0.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4980
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1604
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5104