Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
Contract202303.rtf
Resource
win7-20230220-en
22 signatures
150 seconds
Behavioral task
behavioral2
Sample
Contract202303.rtf
Resource
win10v2004-20230221-en
4 signatures
150 seconds
General
-
Target
Contract202303.rtf
-
Size
14KB
-
MD5
54a48e18674df3ad9165db787dfc1302
-
SHA1
84344585aad1cef5ce33d9c2968c4616cb419154
-
SHA256
2b45d7502ae57319af9cb8e0f44273ef0e1e7aa8ad7e2b2bc7e742e2f9d80700
-
SHA512
01377d7012f23c5b73db9c26197114cacdbd4bfa799b7031bc3fd89cd07487292685af5d3113ab8689f3c4b956f97c2a0dd3eed8951f7040da19b33b3c617ec5
-
SSDEEP
192:81PHedLkbI6AbNPv6FgJC+d5OCMs1M+WF8sP/UW9Iu46jtusj2+3gSmd:zL0AbZSqC+rOvs9MjIuNjtumtwSmd
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4764 WINWORD.EXE 4764 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE 4764 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Contract202303.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4764