Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 07:52
Static task
static1
Behavioral task
behavioral1
Sample
a6cb1aa676e6b77d01129d3e645a53dfd69154f6b682b224b82dfe72b7ac5acf.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a6cb1aa676e6b77d01129d3e645a53dfd69154f6b682b224b82dfe72b7ac5acf.doc
Resource
win10v2004-20220812-en
General
-
Target
a6cb1aa676e6b77d01129d3e645a53dfd69154f6b682b224b82dfe72b7ac5acf.doc
-
Size
22KB
-
MD5
8a1e319623bb2b99e0f81649bf10a34d
-
SHA1
091b264ff0fce2a98adee094015c77d5eaf7470a
-
SHA256
a6cb1aa676e6b77d01129d3e645a53dfd69154f6b682b224b82dfe72b7ac5acf
-
SHA512
1a5a4a7f09bf3b6d7124f73a55af954779e3ae05e1495360036cbfb84761f9812173296238436326b485ccab1338f3b0b31a1c0469933722ee293188d2fcf244
-
SSDEEP
192:5ERulOsvtMNhU8vSXUY2HPASAgURZC42v:5AU1vf8akY2HPj
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4456 WINWORD.EXE 4456 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
WINWORD.EXEpid process 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE 4456 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a6cb1aa676e6b77d01129d3e645a53dfd69154f6b682b224b82dfe72b7ac5acf.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4456