Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 13:28
Behavioral task
behavioral1
Sample
996dcc86a20aafcb13599f18fcdf4d1c0b8e6347d7996a52ec9fd843f848b5f7.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
996dcc86a20aafcb13599f18fcdf4d1c0b8e6347d7996a52ec9fd843f848b5f7.doc
Resource
win10v2004-20240226-en
General
-
Target
996dcc86a20aafcb13599f18fcdf4d1c0b8e6347d7996a52ec9fd843f848b5f7.doc
-
Size
121KB
-
MD5
e02edd30211d5188e927044190389150
-
SHA1
1b2f5df3fa09864ee38f69d1341ee0aa883a33d6
-
SHA256
996dcc86a20aafcb13599f18fcdf4d1c0b8e6347d7996a52ec9fd843f848b5f7
-
SHA512
b8c1278e7a3d9ce48dd62770cd7851efc489b8d6aaa40e8fd00d6dcf36e8235dea3627534884cbd0a775d83d2475664fefae1c860066e58c767be39596e503a6
-
SSDEEP
3072:xtjnuQrDnQOUONO35GeuN99EzTo+YdGSspbmClZWj96ETcc9+FZE8lfnCvEFZEML:jP3h7Y
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4500 WINWORD.EXE 4500 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\996dcc86a20aafcb13599f18fcdf4d1c0b8e6347d7996a52ec9fd843f848b5f7.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4500