Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
b6e5c0406badcddf9a446933f51fddb70f6c2291fe08eb71d258d5457d67dbee_JC.docm
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b6e5c0406badcddf9a446933f51fddb70f6c2291fe08eb71d258d5457d67dbee_JC.docm
Resource
win10v2004-20230915-en
General
-
Target
b6e5c0406badcddf9a446933f51fddb70f6c2291fe08eb71d258d5457d67dbee_JC.docm
-
Size
4.7MB
-
MD5
b390e6672f4d4f66f78bf3f3719dff20
-
SHA1
0da29451486a4472552ee2bb8cb00e9545416b4e
-
SHA256
b6e5c0406badcddf9a446933f51fddb70f6c2291fe08eb71d258d5457d67dbee
-
SHA512
26a8fe666ae66684dc6b0585a699871c47f7c16fbd932d02e07b8ec2dccfa843a8691b958dad713c242af15b81da723d5a2dd9b64b824a948b243399fef2f4b5
-
SSDEEP
98304:Kyd5l3bFoQVdeG25i/GVQH5y79JXe/8cV+wFsV7b+cMKBR9UXzhFoHfx6Zw:FRoQGieVQH5yhNK8cV+wFslycvBROjcn
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3020 WINWORD.EXE 3020 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3020 WINWORD.EXE 3020 WINWORD.EXE 3020 WINWORD.EXE 3020 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b6e5c0406badcddf9a446933f51fddb70f6c2291fe08eb71d258d5457d67dbee_JC.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3020