Analysis
-
max time kernel
150s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 18:05
Behavioral task
behavioral1
Sample
06423b7a50bf51b74a0366eab99adbc6a71b5a2eab7b7e5197fdcffc396c2c7e.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
06423b7a50bf51b74a0366eab99adbc6a71b5a2eab7b7e5197fdcffc396c2c7e.doc
Resource
win10v2004-20221111-en
General
-
Target
06423b7a50bf51b74a0366eab99adbc6a71b5a2eab7b7e5197fdcffc396c2c7e.doc
-
Size
8KB
-
MD5
9c0a893c3ae41dbe0b2d85db32cef782
-
SHA1
3ba5cc4a3032e9614e18d48db8b723854698bb4e
-
SHA256
06423b7a50bf51b74a0366eab99adbc6a71b5a2eab7b7e5197fdcffc396c2c7e
-
SHA512
54d79c7ea4dc1b4cd920e73eceb94b11a63fdf2641a31ae3077017e9a064f47395fc615a4bc966ed0c858f9958ce2759d43e88740d6a305087e4496766ac8ab6
-
SSDEEP
96:qtaZCY+ky3MJJKevp25YnsTkc5nbMT4KlAjigdjUa46ip0:qt2+EGevp25Yn/KYT47jiMIaO
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2936 WINWORD.EXE 2936 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
WINWORD.EXEpid process 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE 2936 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\06423b7a50bf51b74a0366eab99adbc6a71b5a2eab7b7e5197fdcffc396c2c7e.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2936-132-0x00007FFA91030000-0x00007FFA91040000-memory.dmpFilesize
64KB
-
memory/2936-133-0x00007FFA91030000-0x00007FFA91040000-memory.dmpFilesize
64KB
-
memory/2936-134-0x00007FFA91030000-0x00007FFA91040000-memory.dmpFilesize
64KB
-
memory/2936-135-0x00007FFA91030000-0x00007FFA91040000-memory.dmpFilesize
64KB
-
memory/2936-136-0x00007FFA91030000-0x00007FFA91040000-memory.dmpFilesize
64KB
-
memory/2936-137-0x00007FFA8EFD0000-0x00007FFA8EFE0000-memory.dmpFilesize
64KB
-
memory/2936-138-0x00007FFA8EFD0000-0x00007FFA8EFE0000-memory.dmpFilesize
64KB