Analysis
-
max time kernel
130s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 19:10
Behavioral task
behavioral1
Sample
014eebdbef4cb3eb495fe758a6df471f.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
014eebdbef4cb3eb495fe758a6df471f.doc
Resource
win10v2004-20231215-en
General
-
Target
014eebdbef4cb3eb495fe758a6df471f.doc
-
Size
41KB
-
MD5
014eebdbef4cb3eb495fe758a6df471f
-
SHA1
bd7042a9a91ca66ebe8fc6fe38aa409bd8dde8fa
-
SHA256
0e855742a9b50f327752a22d1ac6f1092fc82a26616ac48fe667a4871d47054c
-
SHA512
f37d78737fd6b2fb8780838e40ea3f64ad9f192880fad4ff737dbb469d56b9d6071a0a4c57c6953a84c441225d944759cdb80eed2e1c125ea9bb12a0e00e4413
-
SSDEEP
384:I0s82SKC6pLzjaXeMyj5jxjBDR7X0HwYlz6SMj38XtunVZD6/B:XsM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3312 WINWORD.EXE 3312 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3312 WINWORD.EXE 3312 WINWORD.EXE 3312 WINWORD.EXE 3312 WINWORD.EXE 3312 WINWORD.EXE 3312 WINWORD.EXE 3312 WINWORD.EXE 3312 WINWORD.EXE 3312 WINWORD.EXE 3312 WINWORD.EXE 3312 WINWORD.EXE 3312 WINWORD.EXE 3312 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\014eebdbef4cb3eb495fe758a6df471f.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5c654381fd1a4d96261fab4e2272ca591
SHA1a252997b978930f0eb737ac15edb9a24206f1f30
SHA256185b9a20e8e8ba654e616f425b53bfcdc5a7f17dd1c5e0a442f9cfceaa7e9d92
SHA512cbb0942cf7004af8851701f53fd4294edb9ba6bf211dde5c101f7c3b7819475514f774dcf434594d1dd9796a8378d96ee730052c55cf9a72ba91d3077d767cde