Analysis
-
max time kernel
100s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 12:54
Behavioral task
behavioral1
Sample
C:\Users\user\AppData\Roaming\Microsoft\Templates\Normal.dotm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
C:\Users\user\AppData\Roaming\Microsoft\Templates\Normal.dotm
Resource
win10v2004-20230220-en
General
-
Target
C:\Users\user\AppData\Roaming\Microsoft\Templates\Normal.dotm
-
Size
22KB
-
MD5
9d342602e34419e0077daefb12589f2a
-
SHA1
019205904224c446b09574e43a5fbb0b6e06a7e4
-
SHA256
47bd15404d446450fe162c95160352981850a67f3e75c8fb29a0935c295830c9
-
SHA512
2c969edd7c347a323907275f460225fc440d93690001ff95b093042a64f4d7fe8c4bc71ab2f53e7676310f096d936bbd457e435fb159e5bcf543dc061dec725f
-
SSDEEP
384:C6LZC78S04w/T0VqvWGoB1uGaVQF9p0lhS0wVTnzLizefxY4Waf:Bq8S04w/jFoaQvp0lhS0GzLwefxYq
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\user\AppData\Roaming\Microsoft\Templates\~WRD0000.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4632 WINWORD.EXE 4632 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE 4632 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\user\AppData\Roaming\Microsoft\Templates\Normal.dotm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221B
MD51fc0ee0648841396e58ea659c2a36543
SHA1705b8d428b1b890593e26dc7354f362c30558240
SHA256b9064efa65ab0bf674570b789c4ba678d7c8bb60ba29cf71435867312ef5e82b
SHA512bf8da1f7bf750886fef7fbe09bb715e865894d31d3363648bbcaa1d3a69e1a35286930fd46ed7e88f8d9e60d331f4abb3f00e6b409081358b34ba9d371acc485
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD57e3ceefa7ede006c9fcc636bca446ada
SHA1a5ab5fc1f5846401a6168b609349b19597c207e3
SHA256d8fc7ecc10c5486601cd807935141e85813865c4c5191d9cc40cc60313fd326b
SHA512b46803a31773d249a5c6aa5192a007cada1d436f0a01373b9b56837440a1c73d151437570282e07bf25cf1f6d5920d13023ee98e46eaff5b06793eaa3b4a98af
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize4KB
MD500255f0714dbf76a7b7b4721dc4fa0fe
SHA1c23afb21492928e42f685f3d2242ccb07e7028c9
SHA256bd5b4b0b3455a7a475a09a065f86a0e840efb0778e89f0f8827729035d365d50
SHA5125463d48cd6dcb71879b89ae594b540d8cec8d0e89248d9fb7b3cdbd65d129c71085c246378c6305b3caf52ed4423647ff843e94a305122ac21312e133c84929c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms~RFe56b76e.TMP
Filesize4KB
MD54adfddac8cd37a80a98c2691a7eac7dc
SHA1357aa05914052132717eee82ed2fced424b8b6a8
SHA256958cc7e6d8ee94e1e5654b9da1979e73a89d5dedaee2e52eb5d1b6aa5d1485bb
SHA51219d545357780d0fffac29111648be65a867c953cc1490f327deaad6f2363ad241184057fe107995ea9c915ea77b87f66c65fea474589865b71a83524b4234ebe
-
Filesize
24KB
MD5b90a25c8a0cdc3c84a74141e31cdfad3
SHA17e86ffae5df9aedb13cb445086b5f7da3c13d5b8
SHA256b3e8e3ffb7be61d1bf31d1e406214d90df6b1eb5ada6dc602ca1afdc33260163
SHA512ead56b5b8f5998248364ce1015acb16a6524951e20cc5b317de03add9aa3561000d3958ee61f1b144ed493dc4ea88895223fb9af2ed5169308b1d03ecf0550b4