Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 10:05
Behavioral task
behavioral1
Sample
9492ca1fddcb0a7be122abca637922d0f6661e2172a5dddbd7eb0f04f9abd3e9.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9492ca1fddcb0a7be122abca637922d0f6661e2172a5dddbd7eb0f04f9abd3e9.doc
Resource
win10v2004-20231215-en
General
-
Target
9492ca1fddcb0a7be122abca637922d0f6661e2172a5dddbd7eb0f04f9abd3e9.doc
-
Size
59KB
-
MD5
17a95cca43fee410730ed2991789f33d
-
SHA1
8b3fb0f872dfa04aa442ef16626ca3a7ae201dcc
-
SHA256
9492ca1fddcb0a7be122abca637922d0f6661e2172a5dddbd7eb0f04f9abd3e9
-
SHA512
6ee1f08b954558515cbec7087eaa739151d130ce80f5f547c443a4ecd07e989e230437f55bf9527a085011e84db1bd325392923742903de2a5e980f9ee542cc0
-
SSDEEP
1536:N36h5s3CJQXZBEbarve8AXpCH9um5FaB:x6h5/QJBEbarve8409uQFaB
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4568 WINWORD.EXE 4568 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE 4568 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9492ca1fddcb0a7be122abca637922d0f6661e2172a5dddbd7eb0f04f9abd3e9.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4568