Analysis
-
max time kernel
145s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
ӡɽ2014Ƚг�.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ӡɽ2014Ƚг�.doc
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
ӡɽ2014Ƚг�.doc
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ӡɽ2014Ƚг�.doc
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
ӡɽ2014Ƚг�.pdf
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
ӡɽ2014Ƚг�.pdf
Resource
win10v2004-20220812-en
General
-
Target
ӡɽ2014Ƚг�.doc
-
Size
47KB
-
MD5
10184fb043f4073e94452472608f720f
-
SHA1
3f1c2718e71d7533a3625d7d0922914927d90993
-
SHA256
2c97a1829e0b4918132984d72493841fc1bb8a633c90f39e0487786468295d6c
-
SHA512
df3fac405f250615f330b8b265e9d2d4ef836921a8d63fc27a477ef7e1ff6d3db144e8071570a6a8cf770ff746d8e66de82081c9c3ea28f3d69d9992e03f7175
-
SSDEEP
384:7LYzHp87yf8ezjSp4V44Vk6/JlBAJXK/hGyM+gaQO+3A+m9J4J7Z0jYSjt+LM:7LnzojSwLSN+G5Ium9J4Pfh
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2588 WINWORD.EXE 2588 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE 2588 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ӡɽ2014Ƚг�.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2588