Analysis
-
max time kernel
202s -
max time network
218s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 11:43
Static task
static1
Behavioral task
behavioral1
Sample
1769981b2c003c0225cdaf619b4a2c89.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1769981b2c003c0225cdaf619b4a2c89.doc
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
decrypted.xlsx
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win10v2004-20231215-en
General
-
Target
1769981b2c003c0225cdaf619b4a2c89.doc
-
Size
1.2MB
-
MD5
1769981b2c003c0225cdaf619b4a2c89
-
SHA1
b518e1859cda8fab4e1cf55c622a2c7a3e3f0eb0
-
SHA256
87d4f56ce5c913179ac176837603f2963884ce6f71df4d079bb8ba6faee3fca3
-
SHA512
930d10bd53c57ec110816ce331c18470593dc3bb1e84b29902dd913085f90f1e591fb90e99a32b69c3caf915e08ce72e58c33dcbb2c153fef0d8cca7f5cdc49a
-
SSDEEP
24576:AxhiCWJsu4Q86/MpSPgdq9Y2M+RLDJu2fZ1Z/CzJsUN4ksPkkbhhhhhhhh/hhhhR:auJCs/MpSIqa2nNJu2fbNCxN4ksZZPZt
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1572 WINWORD.EXE 1572 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE 1572 WINWORD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1769981b2c003c0225cdaf619b4a2c89.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1572