Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
3b27f762667346e8d194bed341d35a4e6c9b69cb3210ebbf6c516635c1d6ff23.docm
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3b27f762667346e8d194bed341d35a4e6c9b69cb3210ebbf6c516635c1d6ff23.docm
Resource
win10v2004-20240226-en
General
-
Target
3b27f762667346e8d194bed341d35a4e6c9b69cb3210ebbf6c516635c1d6ff23.docm
-
Size
2.0MB
-
MD5
96c0a209f226c0bdb4335e96322ee248
-
SHA1
8b90690e8f5691f7b3cfb2d5b529af6dd92bed40
-
SHA256
3b27f762667346e8d194bed341d35a4e6c9b69cb3210ebbf6c516635c1d6ff23
-
SHA512
985ce0d31c9c776553519969bbfe09827109026cd8609bd6e0789d9ba5f6643adf09c871d9c608e96fc951ba4c1cc3c5c6466eb59fc1094e4af4afb5d91ca2b9
-
SSDEEP
49152:j8HQUC5btLsPweWuCYStD/xSAcAA3jcu49eacCcZnQIcVQucQpMWPBU2dWaSPCi8:gwjbtLsvWuCYuEpAA34u49/cHBuQucy9
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1792 WINWORD.EXE 1792 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1792 WINWORD.EXE 1792 WINWORD.EXE 1792 WINWORD.EXE 1792 WINWORD.EXE 1792 WINWORD.EXE 1792 WINWORD.EXE 1792 WINWORD.EXE 1792 WINWORD.EXE 1792 WINWORD.EXE 1792 WINWORD.EXE 1792 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3b27f762667346e8d194bed341d35a4e6c9b69cb3210ebbf6c516635c1d6ff23.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1792