Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2023, 00:37
Behavioral task
behavioral1
Sample
8a2504773458c8653ee37ab12ee09714c17268403e3a5511218db3536c7c2fd5.docm
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8a2504773458c8653ee37ab12ee09714c17268403e3a5511218db3536c7c2fd5.docm
Resource
win10v2004-20221111-en
General
-
Target
8a2504773458c8653ee37ab12ee09714c17268403e3a5511218db3536c7c2fd5.docm
-
Size
17KB
-
MD5
f441310fe21a50a66b9f0f110909b614
-
SHA1
fc6dc93fea11a948959db6b9ecb3fe35af394e4d
-
SHA256
8a2504773458c8653ee37ab12ee09714c17268403e3a5511218db3536c7c2fd5
-
SHA512
9a9ab402205de7d635f8b02972756a23da09c377e4a4870310a62096910a03ab24b94e5c7feb76bf8d0ad199a09c7ffe28eef1e942aef83acbb95a81ff44355d
-
SSDEEP
384:/iratn+n3d7YexmLhMBqNcNxt/ZtNNLdgrFsb6Hj8gn11UtUy/:/2gg3djxmLaBqYxllNLdgRsbDgn11UL/
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2700 WINWORD.EXE 2700 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE 2700 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8a2504773458c8653ee37ab12ee09714c17268403e3a5511218db3536c7c2fd5.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2700