Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
7dc57db3bd4fc5b10578ce4b34353856049743cf7ed128514e64fd7160870f2a.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7dc57db3bd4fc5b10578ce4b34353856049743cf7ed128514e64fd7160870f2a.doc
Resource
win10v2004-20231215-en
General
-
Target
7dc57db3bd4fc5b10578ce4b34353856049743cf7ed128514e64fd7160870f2a.doc
-
Size
847KB
-
MD5
d8583b6a6e2d5f0573409c43e86bf359
-
SHA1
6ce0920e0e93ceef008f23711989e57b9b6d810f
-
SHA256
7dc57db3bd4fc5b10578ce4b34353856049743cf7ed128514e64fd7160870f2a
-
SHA512
ed16be1a5abac82bc9bd91cfe1959a947bd72e1430680402edd14eab0ae53e86bf5d72f08c99c6d8f220c3caa5872bfa0f5fa35d688c8201cba5bf2568329f45
-
SSDEEP
24576:T80/2J/8A+h+4+oJ/ZV//W+e48+8/2J/8A+h+4+oJ/ZV//v+4+Y4T/U/J+4+18/D:P/2J/8A+h+4+oJ/ZV//W+e48+8/2J/8F
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4968 WINWORD.EXE 4968 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE 4968 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7dc57db3bd4fc5b10578ce4b34353856049743cf7ed128514e64fd7160870f2a.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4968