Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 21:50
Behavioral task
behavioral1
Sample
95949e13a7a926f285fe29d15df8386e8e47991461e374f6bcce46b23980d685.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
95949e13a7a926f285fe29d15df8386e8e47991461e374f6bcce46b23980d685.doc
Resource
win10v2004-20240226-en
General
-
Target
95949e13a7a926f285fe29d15df8386e8e47991461e374f6bcce46b23980d685.doc
-
Size
906KB
-
MD5
a1bdc647e38d0b77f3752c0949a879f0
-
SHA1
a57892f534caf502126ccd7bb6d21a0cd1d97229
-
SHA256
95949e13a7a926f285fe29d15df8386e8e47991461e374f6bcce46b23980d685
-
SHA512
04b6c815614c30558f87efbce9c4cb0c0da8c8a0109356e9c4ec0234c6a1df579d2f8376369e0d0e227bee00f3ea670e8c27d2e294edc1d010ea151d38e745d7
-
SSDEEP
12288:4Bu6SNL5w0ZpzgWduKGVJFwBq1ItGCT4ed9PJyuU:48thpGMR9hyuU
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2096 WINWORD.EXE 2096 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE 2096 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\95949e13a7a926f285fe29d15df8386e8e47991461e374f6bcce46b23980d685.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2096