Analysis
-
max time kernel
137s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 10:05
Behavioral task
behavioral1
Sample
7cd7980a655c82a4bdd51ed4010bf4f3.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cd7980a655c82a4bdd51ed4010bf4f3.doc
Resource
win10v2004-20231215-en
General
-
Target
7cd7980a655c82a4bdd51ed4010bf4f3.doc
-
Size
29KB
-
MD5
7cd7980a655c82a4bdd51ed4010bf4f3
-
SHA1
d57e1e8010528fd101c0bee5f445ce538fa5b077
-
SHA256
515d6d969cb2fed6d0c4cd68fefbfce8aaddaf2ac3c6c900a47f17cd940d0ffe
-
SHA512
74fa7ad461736f9a57c13ad5152a6abb4990de8f86f3a1f14803c26d2f4971131ef7114275af67c00262cfef2d6eddbbace207b5cdcedc1e36f6c60c5803f8d8
-
SSDEEP
192:AQw2hwUc6nlzVbMjclYKej8XqbFeOOxdqPtVLFb:Pwv6nlzVbMjcluwXqbFeJ8td
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1444 WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\~WRD0000.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1444 WINWORD.EXE 1444 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1444 WINWORD.EXE 1444 WINWORD.EXE 1444 WINWORD.EXE 1444 WINWORD.EXE 1444 WINWORD.EXE 1444 WINWORD.EXE 1444 WINWORD.EXE 1444 WINWORD.EXE 1444 WINWORD.EXE 1444 WINWORD.EXE 1444 WINWORD.EXE 1444 WINWORD.EXE 1444 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7cd7980a655c82a4bdd51ed4010bf4f3.doc" /o ""1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5fe44cb86c76ac5053d736f200a5479d1
SHA16bdc8680673672401662bc5066d311749a7d7d77
SHA256fc2f31e6d4f4df7e48ad074cca5f64beeea772da999319cf4dde751cdff6cb88
SHA512c3729b5e46277b7b56ced0c2644024732d16a445b1bbb18d426ec408a2f03e1931eae4b2be20a730051d92dc27cb1ca0b41a90134781acf6859998bcdfcff065
-
Filesize
24KB
MD59b918b201313849d5639341565295611
SHA1240e3ff07eedfc9830c41da1e40315fe03945fe5
SHA256f07efc67d00534762e8c20d96cfbee457da8adc6d03f81a3330c2defb8bb00c4
SHA512ff572ca3bc0f706513b78cb949bdc5c2a757356f7fab4fc03855208110e42f6f23e638ba15b0dff7caeeb38363de64fe20b7301ccdde3aa762d49bc94e4ab093