Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2023 17:42
Behavioral task
behavioral1
Sample
553f5e8e199ecbe2d9e8520eab2da583.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
553f5e8e199ecbe2d9e8520eab2da583.doc
Resource
win10v2004-20221111-en
General
-
Target
553f5e8e199ecbe2d9e8520eab2da583.doc
-
Size
38KB
-
MD5
553f5e8e199ecbe2d9e8520eab2da583
-
SHA1
f81b753412d4a2fa425b338fbf0ebe8a49c0e82d
-
SHA256
583c86e58d156ccf6215f35af6d6eab676704d7ed869f7a8376d07fdf8313ccb
-
SHA512
4ba326cc6c75fd5bf98244988b98288a57a850b1d66f25966eedf994a874e76a8c2e4b3df3deacd44ce829522bbad27e0705a06885760ead6d50883e1d21b6ee
-
SSDEEP
768:WuhiI1WFssJxUF54CjHFLcAP0F6nY+sAJ:WuoIjOxUFDFLcY0F6nY+sU
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2796 WINWORD.EXE 2796 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
Processes:
WINWORD.EXEpid process 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE 2796 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\553f5e8e199ecbe2d9e8520eab2da583.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2796-132-0x00007FFF0B3F0000-0x00007FFF0B400000-memory.dmpFilesize
64KB
-
memory/2796-133-0x00007FFF0B3F0000-0x00007FFF0B400000-memory.dmpFilesize
64KB
-
memory/2796-134-0x00007FFF0B3F0000-0x00007FFF0B400000-memory.dmpFilesize
64KB
-
memory/2796-135-0x00007FFF0B3F0000-0x00007FFF0B400000-memory.dmpFilesize
64KB
-
memory/2796-136-0x00007FFF0B3F0000-0x00007FFF0B400000-memory.dmpFilesize
64KB
-
memory/2796-137-0x00007FFF08DB0000-0x00007FFF08DC0000-memory.dmpFilesize
64KB
-
memory/2796-138-0x00007FFF08DB0000-0x00007FFF08DC0000-memory.dmpFilesize
64KB