Analysis
-
max time kernel
104s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 11:13
Static task
static1
Behavioral task
behavioral1
Sample
410e3b7b10e6ced1effbbc3b8f0cbf62ae7c6a6195ecec0faadb04d0c5b29d70.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
410e3b7b10e6ced1effbbc3b8f0cbf62ae7c6a6195ecec0faadb04d0c5b29d70.doc
Resource
win10v2004-20220901-en
General
-
Target
410e3b7b10e6ced1effbbc3b8f0cbf62ae7c6a6195ecec0faadb04d0c5b29d70.doc
-
Size
231KB
-
MD5
892f01177d3253934e6a9083ebde327d
-
SHA1
8e6cf7b6ed465d01888fbd509df2f7b836db388c
-
SHA256
410e3b7b10e6ced1effbbc3b8f0cbf62ae7c6a6195ecec0faadb04d0c5b29d70
-
SHA512
74bece19569356c505d9ac541a1c3bbebf7f181cd367ff8d58a59b7f468a8fb1f0b613b6f8168d1afae4a1f853786ff1445b48d9dccff1591befa7982f0bef08
-
SSDEEP
1536:hU0s/ph/Ss2qHwg31jNAmqNBiViviIfM8EAlt8n:S0sxh/SsdNAV7MYlt8n
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4980 WINWORD.EXE 4980 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\410e3b7b10e6ced1effbbc3b8f0cbf62ae7c6a6195ecec0faadb04d0c5b29d70.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4980