Analysis
-
max time kernel
101s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2022 04:30
Behavioral task
behavioral1
Sample
blackcat.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
blackcat.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
blackcat.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
blackcat.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
ĵ.doc
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
ĵ.doc
Resource
win10v2004-20221111-en
General
-
Target
ĵ.doc
-
Size
30.2MB
-
MD5
277dc0423cdb0e81ab4913b56719ee9f
-
SHA1
28f7523185f3af2f441163a8dbb2ec86eeae4360
-
SHA256
cbbeaba48435e1711b2a3d1f2983dac8f5d681d48163782ca5ac3ed9cb63454d
-
SHA512
78d6fdb5b18035978b2518d513d4f2bf27441bb1889a26b35765cd2f303ad44b26d0f105f8e4ed69242fff1348a92e536266f859746cdb00168bc652ae0e91be
-
SSDEEP
3:k63636363636363636363636363636363636363636363636363636363636363z:n
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2420 WINWORD.EXE 2420 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE 2420 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ĵ.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2420