Analysis
-
max time kernel
256s -
max time network
259s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
hsbc_bis_prd_pgp_pub_key202302 - LIVE.asc
Resource
win10v2004-20230220-en
8 signatures
300 seconds
General
-
Target
hsbc_bis_prd_pgp_pub_key202302 - LIVE.asc
-
Size
3KB
-
MD5
c5c0e3af58419537c3a1f5b608ff0b22
-
SHA1
ca20d90d152bdbe4af534c2db21245df91e68d4c
-
SHA256
4da573fb67a7145f87539f1850985222560b3a61b5f4327e8d54b1c10eed67bd
-
SHA512
02d6422591cf113dbc049e942f0583eddb52c3919bac64ac859c0bc0f07d66c9abbe8689a302c82d6ed8274808f5edac387d615f54b185eb18868c8379c1e612
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 836 Winword.exe 836 Winword.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3260 OpenWith.exe -
Suspicious use of SetWindowsHookEx 42 IoCs
pid Process 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 3260 OpenWith.exe 836 Winword.exe 836 Winword.exe 836 Winword.exe 836 Winword.exe 836 Winword.exe 836 Winword.exe 836 Winword.exe 836 Winword.exe 836 Winword.exe 836 Winword.exe 836 Winword.exe 836 Winword.exe 836 Winword.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3260 wrote to memory of 836 3260 OpenWith.exe 85 PID 3260 wrote to memory of 836 3260 OpenWith.exe 85
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\hsbc_bis_prd_pgp_pub_key202302 - LIVE.asc"1⤵
- Modifies registry class
PID:3704
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\AppData\Local\Temp\hsbc_bis_prd_pgp_pub_key202302 - LIVE.asc"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:836
-