Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 19:12
Static task
static1
Behavioral task
behavioral1
Sample
5f075aef93b9e79f95012df7adfe1589f90c22a45a3e99720a9010da0518da1f.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f075aef93b9e79f95012df7adfe1589f90c22a45a3e99720a9010da0518da1f.doc
Resource
win10v2004-20220812-en
General
-
Target
5f075aef93b9e79f95012df7adfe1589f90c22a45a3e99720a9010da0518da1f.doc
-
Size
50KB
-
MD5
8581181088ee281fd02a11bc4e0268b4
-
SHA1
88cb466438a81d1acadfb1173f12a25d43ae8c7e
-
SHA256
5f075aef93b9e79f95012df7adfe1589f90c22a45a3e99720a9010da0518da1f
-
SHA512
c55f827aa62d8bc4883b06591c15982383dc48c2c18dbe77f29e2c04b06849e33d0fc9109322a8cb620ea652e8e5dc9dc3bfb6c6fa040977a16da8515f9eb3e9
-
SSDEEP
384:jejPVgHMZTirSgBLCN/vhski9BscXmAT:jGPq0irSgRCtTVcPT
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 688 WINWORD.EXE 688 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE 688 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5f075aef93b9e79f95012df7adfe1589f90c22a45a3e99720a9010da0518da1f.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:688