Analysis
-
max time kernel
101s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 11:15
Static task
static1
Behavioral task
behavioral1
Sample
b5edeaafe562329fd0d338c1ec497f2cb4ad532915e3ef2aa50d1fce277efaa9.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b5edeaafe562329fd0d338c1ec497f2cb4ad532915e3ef2aa50d1fce277efaa9.doc
Resource
win10v2004-20220901-en
General
-
Target
b5edeaafe562329fd0d338c1ec497f2cb4ad532915e3ef2aa50d1fce277efaa9.doc
-
Size
38KB
-
MD5
4e2aacedc9d08644b5bd19250ae867ae
-
SHA1
76818e04fa4b1b54779680961ca633fb3e3c9289
-
SHA256
b5edeaafe562329fd0d338c1ec497f2cb4ad532915e3ef2aa50d1fce277efaa9
-
SHA512
faa1c7b01551d6e2982582f57766ec18fad5ae1319fdb788111a8908615cdadbb015e071932a7d9fc66a3a5e456008e2e5a774cc3c280b9fcad114a725debe29
-
SSDEEP
768:4YxdMtzBT0V0K0V0K0V0K0K0V0K0V0K0V0K0V0K0V06HSnF:4YCT0V0K0V0K0V0K0K0V0K0V0K0V0K0j
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4788 WINWORD.EXE 4788 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b5edeaafe562329fd0d338c1ec497f2cb4ad532915e3ef2aa50d1fce277efaa9.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4788