Analysis
-
max time kernel
100s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 15:45
Static task
static1
Behavioral task
behavioral1
Sample
a31aaa556b18f8113270da71173806ee8af4ce97e5cb662dc6d7c60d3d6d1284.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a31aaa556b18f8113270da71173806ee8af4ce97e5cb662dc6d7c60d3d6d1284.doc
Resource
win10v2004-20220901-en
General
-
Target
a31aaa556b18f8113270da71173806ee8af4ce97e5cb662dc6d7c60d3d6d1284.doc
-
Size
246KB
-
MD5
e73bf3214188600166c2e6fa2e403217
-
SHA1
6c7ede97fb2ecc0d6cd256eb5755936dadb77ce1
-
SHA256
a31aaa556b18f8113270da71173806ee8af4ce97e5cb662dc6d7c60d3d6d1284
-
SHA512
0b73492e5032b8eb5780fb03d1cd6712f86f458e23cb37bbf66dfa982f83d2cbbda4171363396fa76020b3e9bbae48f727ca0256de62711619b17368d388ee3f
-
SSDEEP
1536:PPxR8benOx2a1yi5Kuqfbya3yPv+9O8/m:XDcZPvlM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4848 WINWORD.EXE 4848 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a31aaa556b18f8113270da71173806ee8af4ce97e5cb662dc6d7c60d3d6d1284.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4848