Analysis
-
max time kernel
100s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 12:54
Behavioral task
behavioral1
Sample
C:\Users\user\AppData\Roaming\Microsoft\Templates\Normal.dotm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
C:\Users\user\AppData\Roaming\Microsoft\Templates\Normal.dotm
Resource
win10v2004-20230220-en
General
-
Target
C:\Users\user\AppData\Roaming\Microsoft\Templates\Normal.dotm
-
Size
22KB
-
MD5
9d342602e34419e0077daefb12589f2a
-
SHA1
019205904224c446b09574e43a5fbb0b6e06a7e4
-
SHA256
47bd15404d446450fe162c95160352981850a67f3e75c8fb29a0935c295830c9
-
SHA512
2c969edd7c347a323907275f460225fc440d93690001ff95b093042a64f4d7fe8c4bc71ab2f53e7676310f096d936bbd457e435fb159e5bcf543dc061dec725f
-
SSDEEP
384:C6LZC78S04w/T0VqvWGoB1uGaVQF9p0lhS0wVTnzLizefxY4Waf:Bq8S04w/jFoaQvp0lhS0GzLwefxYq
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File created C:\Users\user\AppData\Roaming\Microsoft\Templates\~WRD0000.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4632 WINWORD.EXE 4632 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
WINWORD.EXEpid process 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\user\AppData\Roaming\Microsoft\Templates\Normal.dotm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221B
MD51fc0ee0648841396e58ea659c2a36543
SHA1705b8d428b1b890593e26dc7354f362c30558240
SHA256b9064efa65ab0bf674570b789c4ba678d7c8bb60ba29cf71435867312ef5e82b
SHA512bf8da1f7bf750886fef7fbe09bb715e865894d31d3363648bbcaa1d3a69e1a35286930fd46ed7e88f8d9e60d331f4abb3f00e6b409081358b34ba9d371acc485
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD57e3ceefa7ede006c9fcc636bca446ada
SHA1a5ab5fc1f5846401a6168b609349b19597c207e3
SHA256d8fc7ecc10c5486601cd807935141e85813865c4c5191d9cc40cc60313fd326b
SHA512b46803a31773d249a5c6aa5192a007cada1d436f0a01373b9b56837440a1c73d151437570282e07bf25cf1f6d5920d13023ee98e46eaff5b06793eaa3b4a98af
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize4KB
MD500255f0714dbf76a7b7b4721dc4fa0fe
SHA1c23afb21492928e42f685f3d2242ccb07e7028c9
SHA256bd5b4b0b3455a7a475a09a065f86a0e840efb0778e89f0f8827729035d365d50
SHA5125463d48cd6dcb71879b89ae594b540d8cec8d0e89248d9fb7b3cdbd65d129c71085c246378c6305b3caf52ed4423647ff843e94a305122ac21312e133c84929c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms~RFe56b76e.TMP
Filesize4KB
MD54adfddac8cd37a80a98c2691a7eac7dc
SHA1357aa05914052132717eee82ed2fced424b8b6a8
SHA256958cc7e6d8ee94e1e5654b9da1979e73a89d5dedaee2e52eb5d1b6aa5d1485bb
SHA51219d545357780d0fffac29111648be65a867c953cc1490f327deaad6f2363ad241184057fe107995ea9c915ea77b87f66c65fea474589865b71a83524b4234ebe
-
Filesize
24KB
MD5b90a25c8a0cdc3c84a74141e31cdfad3
SHA17e86ffae5df9aedb13cb445086b5f7da3c13d5b8
SHA256b3e8e3ffb7be61d1bf31d1e406214d90df6b1eb5ada6dc602ca1afdc33260163
SHA512ead56b5b8f5998248364ce1015acb16a6524951e20cc5b317de03add9aa3561000d3958ee61f1b144ed493dc4ea88895223fb9af2ed5169308b1d03ecf0550b4