Analysis
-
max time kernel
132s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 08:48
Static task
static1
Behavioral task
behavioral1
Sample
1799c8fcda056ec1bb545f7cca3743c2.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1799c8fcda056ec1bb545f7cca3743c2.doc
Resource
win10v2004-20230220-en
General
-
Target
1799c8fcda056ec1bb545f7cca3743c2.doc
-
Size
51KB
-
MD5
1799c8fcda056ec1bb545f7cca3743c2
-
SHA1
9cbd3ef55ec0044e27ed1f2356990cc766b89ffc
-
SHA256
d9b52e89476da47de66a850e82e35c63b142633dee8585d6901d6c41dd2ffddd
-
SHA512
525cc38c6aad0329a3a4d261c94201c53cd62adeb4b80045e30946a0d0a48f91cb87406a17bc2a9889a7a8048429596561ea654554589b32a644939b83c4810c
-
SSDEEP
384:7+yatEi1aUf5D4YrDzsfyGcSxwAjLWarHOj6eX0jdoutQxOm:Cb9aa58YrDwNfRrI31
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3484 WINWORD.EXE 3484 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 4156 svchost.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
WINWORD.EXEpid process 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE 3484 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1799c8fcda056ec1bb545f7cca3743c2.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3484
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5896f5fe46407a03df480f9a95c9e6f18
SHA1c1a95f23094fce0f53be7361cf598c1d14350f14
SHA2564971299b609c32e71b7f4ba591f16543270e1cbead0aafe60e225d0401508250
SHA5126f81760986c55a9a531841c8999cc18ae620d99f220a3d33cc5794f46deaad0e27dfc1b6e93926139fb6ad1132195b3a5a1ede80c4b9f24bf06bf4b143c04bac
-
Filesize
2KB
MD505b3d2c64f145c0e2438c84c793b31b0
SHA16aac20d4a2f53e9c8a0f645ce0678e37873bcc01
SHA256223796b180da68d58816744f241ff1db184f4a165ec0ac62130ff7c8a1783739
SHA512a90d3fa228b22ef3f84484652118c06f90c9fd10733e361cf2b5d197b1e4bd269139e3cbea457dc339791c117be43d20edb0bb72f54244b4a337b29021607138
-
Filesize
2KB
MD5bdd652f6ded4b7b168ab1cb5b88b4c67
SHA1fd307f0a241f7b5caa19d119f2263a6fac93a494
SHA256cee88242c9ab9eb1e846fc7697e58434bc9587c7639a27ee1a8cf8d95c3a4c8f
SHA5120ee6c3061db540abed71aad37f3b8aa5f212bb8a785ca302ff15966e2debaadc908b5dc0ceb9442f23dd2d7d45492e2192bd0ecd84c2aec4153a94b2375848e8
-
Filesize
225B
MD5519755378e58a854e2bd4652f7195193
SHA1eca94844a06772a58cafa8bb4fccb054cdb450c0
SHA256b5aa96f3f7930aced20f57e7f4fe5957e37be0f504fb2f49606f80b19e79bf20
SHA512b1e3a0dc5562e558bb8542c4f9288ce4493ddc9c5c533fff9a07e008a6acef0fbacfc03d867d5ff54fb602e9f3148fa073bb93a1ca386ea42f88b063f0726d52