Analysis
-
max time kernel
176s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
7953710f25b95a8d5449673b141f3e7b9eddf74d1fe32a1284299cd8a7f2c62d.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7953710f25b95a8d5449673b141f3e7b9eddf74d1fe32a1284299cd8a7f2c62d.doc
Resource
win10v2004-20221111-en
General
-
Target
7953710f25b95a8d5449673b141f3e7b9eddf74d1fe32a1284299cd8a7f2c62d.doc
-
Size
55KB
-
MD5
44addec994e76f28eaa9a990e7ddc992
-
SHA1
65707e6b990f79b75b25b67415e7da0884022fdf
-
SHA256
7953710f25b95a8d5449673b141f3e7b9eddf74d1fe32a1284299cd8a7f2c62d
-
SHA512
37b41182256fcc553e90be75779d3bd0a1f9b69da67a5ff30e7fd417204e1b3f93f6ba599f8573fd1ac987937bbac84f34bf35566c53f66e29bbd8ae15075a5b
-
SSDEEP
768:89U6JFt9zqNBj/m/XMyjrbqiT9hKzJ9+U6JsrbqitYhJ:W/4IvMyAzJ9c
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4488 WINWORD.EXE 4488 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE 4488 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7953710f25b95a8d5449673b141f3e7b9eddf74d1fe32a1284299cd8a7f2c62d.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4488