Overview
overview
10Static
static
10137b35a162...4d.exe
windows7-x64
137b35a162...4d.exe
windows10-2004-x64
2030669b9d...1f.exe
windows7-x64
102030669b9d...1f.exe
windows10-2004-x64
10241b251516...7b.exe
windows7-x64
10241b251516...7b.exe
windows10-2004-x64
104ae73bfefe...44.exe
windows7-x64
104ae73bfefe...44.exe
windows10-2004-x64
104c312e3cce...5c.exe
windows7-x64
104c312e3cce...5c.exe
windows10-2004-x64
10540eb4eb6d...67.exe
windows7-x64
10540eb4eb6d...67.exe
windows10-2004-x64
95e1a82be9d...ee.exe
windows7-x64
105e1a82be9d...ee.exe
windows10-2004-x64
10a9b51a1c84...5e.exe
windows7-x64
10a9b51a1c84...5e.exe
windows10-2004-x64
10abbaee1408...19.exe
windows7-x64
10abbaee1408...19.exe
windows10-2004-x64
10ba794fac4a...ff.exe
windows7-x64
10ba794fac4a...ff.exe
windows10-2004-x64
10c2d55f54c2...12.doc
windows7-x64
4c2d55f54c2...12.doc
windows10-2004-x64
1e42d6acc64...6d.exe
windows7-x64
10e42d6acc64...6d.exe
windows10-2004-x64
10Analysis
-
max time kernel
114s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2023 14:35
Static task
static1
Behavioral task
behavioral1
Sample
137b35a1620fae21dec2f0c3a131d9a0d29cfcd9e82ce8f834eb77d4f4016d4d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
137b35a1620fae21dec2f0c3a131d9a0d29cfcd9e82ce8f834eb77d4f4016d4d.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
2030669b9dc24b34099a10012ea0850380a10205475657c3f8e2d34b5e91551f.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
2030669b9dc24b34099a10012ea0850380a10205475657c3f8e2d34b5e91551f.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
241b2515168df42784e10af72536a6d661d8bd483abae1931d81f11c8ebcdf7b.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
241b2515168df42784e10af72536a6d661d8bd483abae1931d81f11c8ebcdf7b.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
4ae73bfefefb1e74a928827cf4f59b3f136e739775209353af6d43bb5bde0d44.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
4ae73bfefefb1e74a928827cf4f59b3f136e739775209353af6d43bb5bde0d44.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
4c312e3cce557ee17db0299bcc112699e616fb162afdadf12a41815a4a314b5c.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
4c312e3cce557ee17db0299bcc112699e616fb162afdadf12a41815a4a314b5c.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
540eb4eb6d4b81ba016cea7899b4aa104a38d0a539bf018140fb552de00ee267.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
540eb4eb6d4b81ba016cea7899b4aa104a38d0a539bf018140fb552de00ee267.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
5e1a82be9d8f3ed23343ff5dd356625fabb8a16fb2e8e637051913a9f05342ee.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
5e1a82be9d8f3ed23343ff5dd356625fabb8a16fb2e8e637051913a9f05342ee.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
a9b51a1c8409470cf8204ec646aabdd91cf7aa424dfaeaf5e58447e65065925e.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
a9b51a1c8409470cf8204ec646aabdd91cf7aa424dfaeaf5e58447e65065925e.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
abbaee140815099a2d6b0d4edbc24c39f18bb451a32e67a18c511c7a164b7e19.exe
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
abbaee140815099a2d6b0d4edbc24c39f18bb451a32e67a18c511c7a164b7e19.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral19
Sample
ba794fac4af75d1fb23270a772d17d36b2d84606cffb38a991e41a22a21b7cff.exe
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
ba794fac4af75d1fb23270a772d17d36b2d84606cffb38a991e41a22a21b7cff.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
c2d55f54c26d6f73908c7138e999fadcb9a8617fea8f56cee943f93956adfa12.doc
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
c2d55f54c26d6f73908c7138e999fadcb9a8617fea8f56cee943f93956adfa12.doc
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
e42d6acc643608d3be98a986efbb2ae23865c200b4f029182943a8b6447acf6d.exe
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
e42d6acc643608d3be98a986efbb2ae23865c200b4f029182943a8b6447acf6d.exe
Resource
win10v2004-20230220-en
General
-
Target
c2d55f54c26d6f73908c7138e999fadcb9a8617fea8f56cee943f93956adfa12.doc
-
Size
679KB
-
MD5
7f075616272cca52e731c11080d0f3ef
-
SHA1
b5142fe556fc114eb221c4b14ad9d19c9e83fe83
-
SHA256
c2d55f54c26d6f73908c7138e999fadcb9a8617fea8f56cee943f93956adfa12
-
SHA512
f9fe3bb4f04138c8c924a74f35c293cbe3e777a6f2993c0352e4de9f6677807fcb982190d2a070925ee7a6810a136f2f7c1358babe5e8087736513f6b77982a7
-
SSDEEP
12288:WXQnnE6+s3WsZ/lkwR939lgKFWRg1xY0VcRuaHuatAUz3huJ7XrjaJ+:WXQnnYsNHXR9NlgobVcUK7UXrj++
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1056 WINWORD.EXE 1056 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c2d55f54c26d6f73908c7138e999fadcb9a8617fea8f56cee943f93956adfa12.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5d5c5e16f5d1a574b4643ca75feeff934
SHA13a4498112d3c8196b87120923c449db83477129c
SHA256b32ef8a281ffc811ed9fb7ac4a27cea7cee2d95e5f98e5aab7e6c3c549522c52
SHA5121c08179c39b678d8aaf15024db1d83d50170c82b8986c180a9c2318eeb60358424b96c4b5443d9c983e1e8df3d31512bb6bff4e95ec35d45224b57593d4adab0