Analysis
-
max time kernel
155s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
02235151f3ac3e9f701442a525f7bc50.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02235151f3ac3e9f701442a525f7bc50.doc
Resource
win10v2004-20231215-en
General
-
Target
02235151f3ac3e9f701442a525f7bc50.doc
-
Size
27KB
-
MD5
02235151f3ac3e9f701442a525f7bc50
-
SHA1
4de2e2359b99a29f0747c126a72c3f5e42d6881e
-
SHA256
a6d16b19c4e6e6c724446ae0e24611953761107585351b647d0f8f0091fbdd57
-
SHA512
675ca754f18507b7c13aff3f14b29793482b674f0c4a8876e41ccf848d3fbfe9967590d012be33ec3a3943d8ad8c51ed148f57b1d203a954ba43ecdeea866dbe
-
SSDEEP
192:c3SkKOCt9TVA7R1fqhibVATy0mToTMjtIcuQktQVRC:c3doiR9jbaTy0ycMjtIjt
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1008 WINWORD.EXE 1008 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE 1008 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\02235151f3ac3e9f701442a525f7bc50.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD59ed60ea07ab1dcd1fe6be6c23bd8fb46
SHA12a0be2a3ef109ce1fcd2a394481b5931d63047bc
SHA256fc669a175fbe57f3e5afb523b043ae567f5b9e0d75f1fccb25d50f41e516b78f
SHA512e921583ad563143c44d2021e11137042eddb8be2fa19f9b09928f3badb0bc7ecaaf8074cefeb21b8bc465aadb7f43ae088a488f7659b4faebdc28ea5bae51b4e