Analysis
-
max time kernel
182s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 12:40
Static task
static1
Behavioral task
behavioral1
Sample
112358759ec2493c3d16e044075085f9382d700c9e104bdb788315bd53c8cc17.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
112358759ec2493c3d16e044075085f9382d700c9e104bdb788315bd53c8cc17.doc
Resource
win10v2004-20221111-en
General
-
Target
112358759ec2493c3d16e044075085f9382d700c9e104bdb788315bd53c8cc17.doc
-
Size
63KB
-
MD5
948b970eb8c0e062cce03ee0eca168ac
-
SHA1
679e9cb786c2a831ed4cc7887d7fa8c04870c2f0
-
SHA256
112358759ec2493c3d16e044075085f9382d700c9e104bdb788315bd53c8cc17
-
SHA512
2ad9ecd5b4388390558da1ebdf4dad934b9a3d197d0d2cc56546966adfe37b07b371e467d511c24a1510049f7423c0b6378bac70b843310bcdeebf7e50e3e6fe
-
SSDEEP
384:xGiCMeP0A8WnycWodCmMyv/V7QX5Lf77Y2uC4O03o3+JnA+XNPfqIpX0jrT6xt63:xjCHsA9so9v9QX1Q2uVOCouu+Xdf7kn
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\~WRD0000.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4220 WINWORD.EXE 4220 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4220 WINWORD.EXE 4220 WINWORD.EXE 4220 WINWORD.EXE 4220 WINWORD.EXE 4220 WINWORD.EXE 4220 WINWORD.EXE 4220 WINWORD.EXE 4220 WINWORD.EXE 4220 WINWORD.EXE 4220 WINWORD.EXE 4220 WINWORD.EXE 4220 WINWORD.EXE 4220 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\112358759ec2493c3d16e044075085f9382d700c9e104bdb788315bd53c8cc17.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4220