Analysis
-
max time kernel
114s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 08:13
Static task
static1
Behavioral task
behavioral1
Sample
806b6bdbd08ad3ce6ef80e98af391220a71b4a69169c159e582067df46a26204.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
806b6bdbd08ad3ce6ef80e98af391220a71b4a69169c159e582067df46a26204.doc
Resource
win10v2004-20220812-en
General
-
Target
806b6bdbd08ad3ce6ef80e98af391220a71b4a69169c159e582067df46a26204.doc
-
Size
324KB
-
MD5
510373e64ab11602490e0e5eb36ef4d1
-
SHA1
284e402d86e35a510e428bd6dc990e1d6d87a8bc
-
SHA256
806b6bdbd08ad3ce6ef80e98af391220a71b4a69169c159e582067df46a26204
-
SHA512
30f536eeccc1200bf69f3adef6214387a17c919f332ca120b56e1d20dfd9e996c4aaa38f4d593ee7d25e05f8add7b17ea02922e3d4ac59403ab1d574c76345ff
-
SSDEEP
6144:xzAFVteZhTDb2WzbxEvk69q6CC4KEqU/G0VmyhNz+0dfpnXh:CfeqAxEvl9j34KEqcG02sRh
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1436 WINWORD.EXE 1436 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1436 WINWORD.EXE 1436 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1436 WINWORD.EXE 1436 WINWORD.EXE 1436 WINWORD.EXE 1436 WINWORD.EXE 1436 WINWORD.EXE 1436 WINWORD.EXE 1436 WINWORD.EXE 1436 WINWORD.EXE 1436 WINWORD.EXE 1436 WINWORD.EXE 1436 WINWORD.EXE 1436 WINWORD.EXE 1436 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1436 wrote to memory of 4876 1436 WINWORD.EXE 86 PID 1436 wrote to memory of 4876 1436 WINWORD.EXE 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\806b6bdbd08ad3ce6ef80e98af391220a71b4a69169c159e582067df46a26204.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4876
-