Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2023 08:50
Static task
static1
Behavioral task
behavioral1
Sample
8ce2f866187d1993dbf4e0c850d112d0.doc
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8ce2f866187d1993dbf4e0c850d112d0.doc
Resource
win10v2004-20230915-en
General
-
Target
8ce2f866187d1993dbf4e0c850d112d0.doc
-
Size
198KB
-
MD5
8ce2f866187d1993dbf4e0c850d112d0
-
SHA1
957e57aed77af5cd95e232bec8c4d55d31cd83b0
-
SHA256
efdf5d9470d62b3e2bad4f44494bec8633861b9a69b2b4ea83664ecde7ea33f2
-
SHA512
fe3afcc9635702472dbc961b039e909d7f3c41735ebc5c5e0ab45a27b55a380977ee2188389f22d4db1fdb5d0dae77771a24e93aab228aba9817afbcfcd230a2
-
SSDEEP
3072:85XulxpvOEJW178sn0zifCY+CNW7i1ScG8BZDgQQN+7IbsxpvOEJW17g/:85elxpvfOApzmCjmlGinQJgxpvfOE
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3832 WINWORD.EXE 3832 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE 3832 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3832 wrote to memory of 2980 3832 WINWORD.EXE 89 PID 3832 wrote to memory of 2980 3832 WINWORD.EXE 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8ce2f866187d1993dbf4e0c850d112d0.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD549076e72ca5ef3c528889277590ff122
SHA14400ef5defbaa2acbf5dfd6070bb150265a6fb13
SHA256442f2912a598e40114a86b83b725968a3048e10f25367916247bb4322b3221a3
SHA5121cd3510f41fc186b1f69f2db7a98f4952009c7139a7887e79d1765a470254358fdfea3095ceef6528267d2ddd7c55d1a694fe87df78faea68713f89253773637