Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
15-01-2024 00:10
Static task
static1
Behavioral task
behavioral1
Sample
ЖКХ Информ. донесение.docx
Resource
win10-20231215-en
windows10-1703-x64
4 signatures
150 seconds
General
-
Target
ЖКХ Информ. донесение.docx
-
Size
75KB
-
MD5
0ddb922462b1ea5365a5bfaa1833b656
-
SHA1
c8e0f53b8dcb8601dd5ac7456950575d3c57364c
-
SHA256
46d4a137d44a53c81037a4003a814365be26cfb5ed427de263b426b0462d4ed4
-
SHA512
cfed494c04012667085dc186d6ee9d6abc2979fedc383919a8dcc15bb8932a56ba4ca7e94fb8a6fb0f0c578284a41e6ca6b8ad4255e99dfeae9d0c5b9a448343
-
SSDEEP
1536:JccomBXj8K3QOHb2PN6mTYF59VOK1/MlPMi2rA02F4gB/GQ:KctXjVgO72PN6dOkMlPMdn2F4seQ
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3304 WINWORD.EXE 3304 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3304 WINWORD.EXE 3304 WINWORD.EXE 3304 WINWORD.EXE 3304 WINWORD.EXE 3304 WINWORD.EXE 3304 WINWORD.EXE 3304 WINWORD.EXE 3304 WINWORD.EXE 3304 WINWORD.EXE 3304 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ЖКХ Информ. донесение.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3304