Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 01:20
Behavioral task
behavioral1
Sample
8534218ca24cdc9b80b7e4e855a2057a91507659181ecf3b68116149121525ca.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8534218ca24cdc9b80b7e4e855a2057a91507659181ecf3b68116149121525ca.doc
Resource
win10v2004-20220812-en
General
-
Target
8534218ca24cdc9b80b7e4e855a2057a91507659181ecf3b68116149121525ca.doc
-
Size
36KB
-
MD5
648ef9f214abb2d02425363870cea441
-
SHA1
3fcb7df96aae28364ea053e7e22431f816b4e31a
-
SHA256
8534218ca24cdc9b80b7e4e855a2057a91507659181ecf3b68116149121525ca
-
SHA512
376ae0e818a19e7233bca4d8eaeccc6ac44a37fb3d7b54e9cc557fea629ae87dd916995cdc341da546bad704115b15f6a15002906c0129c7d9654502413c0709
-
SSDEEP
384:n7eOz+2viSeav9LyGmX6//GlGFtkIsn4YMdgeX0jowk:nqOz1f9LTmY/GlWbT
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2548 WINWORD.EXE 2548 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
WINWORD.EXEpid process 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8534218ca24cdc9b80b7e4e855a2057a91507659181ecf3b68116149121525ca.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2548