Analysis
-
max time kernel
103s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 12:19
Static task
static1
Behavioral task
behavioral1
Sample
fe510664fc516ee3f59aaf7f18358aea269c1d51f7ba39ae921b36caee71d417.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe510664fc516ee3f59aaf7f18358aea269c1d51f7ba39ae921b36caee71d417.doc
Resource
win10v2004-20220901-en
General
-
Target
fe510664fc516ee3f59aaf7f18358aea269c1d51f7ba39ae921b36caee71d417.doc
-
Size
579KB
-
MD5
82dd5265f132dfed8645c1653fec3072
-
SHA1
b392c7888bd45f0c5fae8dc23f19da32762d7754
-
SHA256
fe510664fc516ee3f59aaf7f18358aea269c1d51f7ba39ae921b36caee71d417
-
SHA512
3d51d4b2fcd10f5e36421fadb6a48c26c90f8cc700018c93ffcc39b53b0957d138d988e9b963303b40481ba873e11337074021bc85f5c33bbc489dcf9c727d09
-
SSDEEP
12288:N3zAZrYus20RQU3Y1g6+SoQKFsz1udf2hYnOX:wHs3Rb76E7sJudf68
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2016 WINWORD.EXE 2016 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fe510664fc516ee3f59aaf7f18358aea269c1d51f7ba39ae921b36caee71d417.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2016