Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 09:54
Behavioral task
behavioral1
Sample
53342d7b493f1c33311c581e8a400368e820f208d6729efd827dfcc352fa4f50.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
53342d7b493f1c33311c581e8a400368e820f208d6729efd827dfcc352fa4f50.doc
Resource
win10v2004-20240226-en
General
-
Target
53342d7b493f1c33311c581e8a400368e820f208d6729efd827dfcc352fa4f50.doc
-
Size
88KB
-
MD5
c1fe6de970d1c5d2d56c6d827a9b2d07
-
SHA1
af5e6bfc0c844b07ddddaeabe18b6330ed686f0f
-
SHA256
53342d7b493f1c33311c581e8a400368e820f208d6729efd827dfcc352fa4f50
-
SHA512
04acb2a1715e12c645e8438a01ab7dcaf426d4962587d64213502ebf87d59c1f579d3e8520be31225597ad989f98e39959cdd4efaefaa0e224df3cf8e9ab5f69
-
SSDEEP
1536:8yJtSkwxD1UC2v0Tebm4lKwRlP9ptCnZT476O7q9914/bXJVUwlz8autv1ssEtIJ:8yJtSN91UC2v0Tebm4lKwRlD8ZTS6T9F
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3408 WINWORD.EXE 3408 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE 3408 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\53342d7b493f1c33311c581e8a400368e820f208d6729efd827dfcc352fa4f50.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3408