Analysis
-
max time kernel
184s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 01:23
Static task
static1
Behavioral task
behavioral1
Sample
a088b18ee3f19044ee52526cf3c09a5daa5f4a3ea306aae3ba8f589fc57dcdb6.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a088b18ee3f19044ee52526cf3c09a5daa5f4a3ea306aae3ba8f589fc57dcdb6.doc
Resource
win10v2004-20221111-en
General
-
Target
a088b18ee3f19044ee52526cf3c09a5daa5f4a3ea306aae3ba8f589fc57dcdb6.doc
-
Size
51KB
-
MD5
1cd91cf4170f08962daf99721f72ebad
-
SHA1
0d37e5a2f695b31fc14a864a01b5da41456a3477
-
SHA256
a088b18ee3f19044ee52526cf3c09a5daa5f4a3ea306aae3ba8f589fc57dcdb6
-
SHA512
4d796db4c35125f155c177855cbb893e0f20233effb6dc5f6dcbb4a25bb4a84a6597fbc240e1957943416b37a736e41bd5d39e1b7ff2f627c67be71fbbaad585
-
SSDEEP
768:3egfqvqWQEKO/JZtnKWtIKqA6KcAPoxwH:3XivqT5jAPoM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2700 WINWORD.EXE 2700 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a088b18ee3f19044ee52526cf3c09a5daa5f4a3ea306aae3ba8f589fc57dcdb6.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2700