Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:55
Behavioral task
behavioral1
Sample
271b4eefbd0a2c121f8807968cb07b48.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
271b4eefbd0a2c121f8807968cb07b48.doc
Resource
win10v2004-20231215-en
General
-
Target
271b4eefbd0a2c121f8807968cb07b48.doc
-
Size
72KB
-
MD5
271b4eefbd0a2c121f8807968cb07b48
-
SHA1
9e16e6b7f99cf38705000a01d9036aacabe92f82
-
SHA256
bdb386f324dd52a309af95beafe0b3673ab2330b8c7ffefa6b3a566f78c6d31d
-
SHA512
201726b44642c51844c3bdac61ae7748654b3f8311a1f98a7473a520e1cdc61c2cef30b4aa4b391469c01d90582823e466989259df617e4c8ff570c63d53160e
-
SSDEEP
768:vTo2MxOmEksGJgG4z82wZNw3B3kXrm0w9hVZzZri6Af2ph99vpWP5qQh3:vMnEk728rNuqzwPVZzZm5f2ph92RqQh3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3704 WINWORD.EXE 3704 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\271b4eefbd0a2c121f8807968cb07b48.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5e759c9404378156eab8817c075ddd01b
SHA14667911eb96391ad737718e974db486bfa20d67b
SHA256bb9360435dddb5084b12a298cda69fc827902b46cdc4bfbf5eadc3877e275a19
SHA512a3ac056b55653008b8115c68cb66b0d8455abd67ebcab351959c63f2e7b00e2a71ca20436bf94fe261f583b62974556a9f574cdcaf4bb7b2f116d367a57716e9