Analysis
-
max time kernel
124s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2023 14:50
Static task
static1
Behavioral task
behavioral1
Sample
New Order.rtf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
New Order.rtf
Resource
win10v2004-20221111-en
General
-
Target
New Order.rtf
-
Size
42KB
-
MD5
8ad8c615dab288132971594224aa8f4e
-
SHA1
dbd94f5775c44c674c2470e39e39bd60386b9740
-
SHA256
0edd773875311776998229b0609be9f287c37ca828b35f74c6c2f0cbdd99449f
-
SHA512
dfa228af6fecc10c8097dbb86ed6c05dff9cde4881b2e34387ed09e9ebad140ddcc96065cf41e05a2acfdac3efad07c7c064346aa00f5f45632d904fb5f6c9d3
-
SSDEEP
768:aFx0XaIsnPRIa4fwJM2Fx0XaIsnPRIa4fwJMTUjOlan0Sp3jfsFDs:af0Xvx3EM2f0Xvx3EMYjJVfsi
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEWINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
WINWORD.EXEEXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1960 WINWORD.EXE 1960 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 25 IoCs
Processes:
WINWORD.EXEEXCEL.EXEpid process 1960 WINWORD.EXE 1960 WINWORD.EXE 1960 WINWORD.EXE 1960 WINWORD.EXE 1960 WINWORD.EXE 1960 WINWORD.EXE 1960 WINWORD.EXE 1960 WINWORD.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE 3388 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\New Order.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1960
-
C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:3388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177
Filesize471B
MD583a0e7f8dfbbf31a3030ddc6ae81663a
SHA1064cedc52b40e2e349ec636f5e6a03fe91044c47
SHA256a3fb75053cd75aa71f8cffbf7e875f8aec24080a9b07245d7ff178510ac9cb0b
SHA51250183e7cfd020c88e39f3ef588675fe16a9d0428b5d23c433a625d74a521031f88d5fa357f6f1f4b93af20e2ae704d9425d0c9081773ee2f0d4bf53bc1a7e7cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177
Filesize442B
MD530afe8bb03553ebf9846c93e69eae115
SHA1751bc15c49505a3fa9e7d8991b1c1dfed2ec3bac
SHA2567a4b8bc90cda03913d37a7fc40085d120b4ceccf9182d30408655aeebeb59831
SHA5120a2894b60d3dbb4ae4f6733408e90fcf7719c8753afe1984472b7a481bfa53836316f0baa718e2f4bfa9aa35915b9acce516681918722b8a77d08a2cc5fb1781
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\10CA7916-6A11-4BDA-9D3A-9BC378726A54
Filesize149KB
MD5ab04002d54d5673ac98a35661dde71d3
SHA1d9a12a544cc768ee3ea25e0adfa3420953d529d4
SHA256a2da14628b0f70f9636ea3589a5ea294b611f5cf7110a5d825dab10dca15abfd
SHA5122298996bb4e764fb32d819ed76437e4c071ac36bbdc540bb5f310028c05a4fb90c583f3ee8414a412f8276124ff5dcfe7cc1d8208951d3a31eb5f8086547e227