Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 01:33
Behavioral task
behavioral1
Sample
632fd12bde5970402ad44c47964a38ea.doc
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
632fd12bde5970402ad44c47964a38ea.doc
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
632fd12bde5970402ad44c47964a38ea.doc
-
Size
290KB
-
MD5
632fd12bde5970402ad44c47964a38ea
-
SHA1
4660966973896459b262ee829a7ff81665b3958b
-
SHA256
a715eb5ce9ebef16036dae851a62c8dd16c187e0c48576ae6dcd298872f55c36
-
SHA512
c6b80a1e7aff0280659d620a9b8929f6de7600b5f849ffa4a341033d73079eb6caf12de426f8ef2c22673244e0caaeb9d848d093f6d590307d6a95eb7c5dbf34
-
SSDEEP
3072:n9nytLPk8keiNKeWoGjtEID4fd4WIFgwR7mTFA02105VCM7agqCpnUgm:UtjzkKjtEIDCsSTFt2wVCaagqCRUgm
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2080 WINWORD.EXE 2080 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE 2080 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\632fd12bde5970402ad44c47964a38ea.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2080