Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 04:18
Static task
static1
Behavioral task
behavioral1
Sample
KSY Product Catalog.rtf
Resource
win7-20230712-en
windows7-x64
20 signatures
150 seconds
Behavioral task
behavioral2
Sample
KSY Product Catalog.rtf
Resource
win10v2004-20230703-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
KSY Product Catalog.rtf
-
Size
39KB
-
MD5
cc47323a812b42250d34573c4b9f12e0
-
SHA1
2af65a3a53f0a39fe33c17aa43698c2d1a0bee61
-
SHA256
1646017b8052c3ea33881beeb6c7e7755567eaa49c4eb2df8e7d89496af01f7d
-
SHA512
ddb75c8b423ea343d6694ccee5e517a9936f3a93cff3c504e482f376c5925b1af1994d43feeb65bbfab7c78a2e9420c8f2d301fd6f2fe777a14f65b49a5ae4e4
-
SSDEEP
768:oFx0XaIsnPRIa4fwJMrhv97Lxub+x034EWa+fBV8kH:of0Xvx3EM19HxubBfWRBykH
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3184 WINWORD.EXE 3184 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3184 WINWORD.EXE 3184 WINWORD.EXE 3184 WINWORD.EXE 3184 WINWORD.EXE 3184 WINWORD.EXE 3184 WINWORD.EXE 3184 WINWORD.EXE 3184 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\KSY Product Catalog.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3184