Analysis
-
max time kernel
29s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
SamenvattingSemester2-1.docx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SamenvattingSemester2-1.docx
Resource
win10v2004-20240226-en
General
-
Target
SamenvattingSemester2-1.docx
-
Size
11.2MB
-
MD5
669d4970b5f7c8716d14f7005de3e5aa
-
SHA1
60d9af10088e674c14dbf21c285328fb4f0e5728
-
SHA256
d008162543ef355e6c9ac18b8988205ea14495798af29dd582610d7758b9dfeb
-
SHA512
e35ccebf10f24bb0498c318008e83db8cb6f20233c93ec4377e7a54e29170dffbf5c9cb17b3ed4f309fc67a8640118372b093844cce9e5274abccb8ecd3d7aae
-
SSDEEP
196608:TZQN4CsvC121Bhv8lspIJtOL9vwkHKaVXE7PcjB2lA3s8fab/Z2qi4zqdPFjX7uQ:9e4laW5S0YOZGaGc0LZ24zqhRXXtOJW
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4960 WINWORD.EXE 4960 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4960 WINWORD.EXE 4960 WINWORD.EXE 4960 WINWORD.EXE 4960 WINWORD.EXE 4960 WINWORD.EXE 4960 WINWORD.EXE 4960 WINWORD.EXE 4960 WINWORD.EXE 4960 WINWORD.EXE 4960 WINWORD.EXE 4960 WINWORD.EXE 4960 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SamenvattingSemester2-1.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4960