Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2023 15:47
Static task
static1
Behavioral task
behavioral1
Sample
NA_34d0f98cec02e36273e2e3fad_JC.rtf
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_34d0f98cec02e36273e2e3fad_JC.rtf
Resource
win10v2004-20230703-en
General
-
Target
NA_34d0f98cec02e36273e2e3fad_JC.rtf
-
Size
42KB
-
MD5
50a7ad2ace11903c9d16a6c8660631de
-
SHA1
d67e713c65195405dd9a97034d15c7d8fa3b37bb
-
SHA256
34d0f98cec02e36273e2e3fadfc535875acf7df8dc8e68b5a9b10ab74300cde9
-
SHA512
be37c692d197263b425745077c743b91e2dd90fa1e2ac531b8d00d904012df52928d5638733de1be2556dc78ab01b2dbd2020d9e36c4281c67f46068bdff3fd0
-
SSDEEP
768:MFx0XaIsnPRIa4fwJMAUZCdpcWyxGPnSCX4gApJ43XvtcB62anYp:Mf0Xvx3EMAUCTcWyxGPdvnvtcBHanYp
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3964 WINWORD.EXE 3964 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 3964 WINWORD.EXE 3964 WINWORD.EXE 3964 WINWORD.EXE 3964 WINWORD.EXE 3964 WINWORD.EXE 3964 WINWORD.EXE 3964 WINWORD.EXE 3964 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\NA_34d0f98cec02e36273e2e3fad_JC.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3964