Overview
overview
10Static
static
10da298e4d09...78.zip
windows7-x64
1da298e4d09...78.zip
windows10-2004-x64
1oleObject1.exe
windows7-x64
10oleObject1.exe
windows10-2004-x64
10ppt\embedd...3.pptx
windows7-x64
1ppt\embedd...3.pptx
windows10-2004-x64
1ppt\vbaProject.doc
windows7-x64
1ppt\vbaProject.doc
windows10-2004-x64
1Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2023 04:52
Behavioral task
behavioral1
Sample
da298e4d09a9e151c6bf60e8ebfdd8fc2e633d078c705db768e3284acdad0678.zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
da298e4d09a9e151c6bf60e8ebfdd8fc2e633d078c705db768e3284acdad0678.zip
Resource
win10v2004-20231127-en
Behavioral task
behavioral3
Sample
oleObject1.exe
Resource
win7-20231201-en
Behavioral task
behavioral4
Sample
oleObject1.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral5
Sample
ppt\embeddings\oleObject3.pptx
Resource
win7-20231130-en
Behavioral task
behavioral6
Sample
ppt\embeddings\oleObject3.pptx
Resource
win10v2004-20231130-en
Behavioral task
behavioral7
Sample
ppt\vbaProject.doc
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
ppt\vbaProject.doc
Resource
win10v2004-20231127-en
General
-
Target
ppt\vbaProject.doc
-
Size
18KB
-
MD5
79d8eef6898ea0a2c7b1f48728ed5936
-
SHA1
d72a0cb2c7e44ccef4b4fc823f99daf7b1f575fe
-
SHA256
c8a2a44b8e35811f9e7f6ab4501c75743605b718a80b4ee97ba00b82cb9b7bd8
-
SHA512
5c9de8c293944b652aa8eac99bdddfb9a7d35c8f6f8cec1f06321f119d87e412d182eb740cca0ba213e44c5ed8e2dbd14aa1a1cd9757aa9090bebc2224c89c81
-
SSDEEP
192:WNG+sw7nftdZYMYilYx/1UTID55UGO2/2rRjuzsoHon9a:Wgrw7nFdCPLxtUT05yjIon
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3240 WINWORD.EXE 3240 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE 3240 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ppt\vbaProject.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3240