Analysis
-
max time kernel
166s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 09:48
Static task
static1
Behavioral task
behavioral1
Sample
3a70eee9ddef3e64d1f6d1592268a6c1f2d3103a722b65787086486cb82b5eb7.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a70eee9ddef3e64d1f6d1592268a6c1f2d3103a722b65787086486cb82b5eb7.doc
Resource
win10v2004-20240226-en
General
-
Target
3a70eee9ddef3e64d1f6d1592268a6c1f2d3103a722b65787086486cb82b5eb7.doc
-
Size
444KB
-
MD5
d736bfe7e7c7e6672ebfc9d119aa8673
-
SHA1
02efd1d184c28f6197334926f6388297b9c74647
-
SHA256
3a70eee9ddef3e64d1f6d1592268a6c1f2d3103a722b65787086486cb82b5eb7
-
SHA512
8205a1f89eade649c3599a65f6bb1b9f195f85032335ab813f4adca0c7401bc43a0d144b4c572f1905f6de12891d2250a244286c5a243e6e401bb8ece47e7720
-
SSDEEP
12288:L8WgjhTU14oVAZu0x1KkXQ3G0NwBp7UEyC7OAmkbwm6z:NgjhTU1xVAZu0x1KkXQ3G0yUEj7OAmWo
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2660 WINWORD.EXE 2660 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE 2660 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3a70eee9ddef3e64d1f6d1592268a6c1f2d3103a722b65787086486cb82b5eb7.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2660