Analysis
-
max time kernel
101s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2022 21:36
Behavioral task
behavioral1
Sample
bb663a07ed2ad46dd1788600d478278fb327fc6e570a2441d2b670444ce2c672.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb663a07ed2ad46dd1788600d478278fb327fc6e570a2441d2b670444ce2c672.doc
Resource
win10v2004-20221111-en
General
-
Target
bb663a07ed2ad46dd1788600d478278fb327fc6e570a2441d2b670444ce2c672.doc
-
Size
33KB
-
MD5
7a56a0b4eb5742e8b5f93d5e1e50485c
-
SHA1
f267bd8164bafa69d0289d8ebd930a71bcb51a5e
-
SHA256
bb663a07ed2ad46dd1788600d478278fb327fc6e570a2441d2b670444ce2c672
-
SHA512
3254ed4ee373ac3e41a6c343f767a6499ed746c547b487ca2b1e27d46b7a67b6d64a438fb93619a31b1750ed69c57acdc5082530f6985d57a856e30acbf65d76
-
SSDEEP
384:8E8iSwvxjk+tqb3TKCVc50jmMOtbg5FeUaWD:8qxw+te3shg5FeUaW
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 1280 calc.exe 31 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings calc.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4756 WINWORD.EXE 4756 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4756 WINWORD.EXE 4756 WINWORD.EXE 4756 WINWORD.EXE 4756 WINWORD.EXE 4756 WINWORD.EXE 4756 WINWORD.EXE 4756 WINWORD.EXE 1060 OpenWith.exe 4756 WINWORD.EXE 4756 WINWORD.EXE 4756 WINWORD.EXE 4756 WINWORD.EXE 4756 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bb663a07ed2ad46dd1788600d478278fb327fc6e570a2441d2b670444ce2c672.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4756
-
C:\Windows\system32\calc.execalc1⤵
- Process spawned unexpected child process
- Modifies registry class
PID:4412
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1060