Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 09:35
Behavioral task
behavioral1
Sample
033234b66901bd96483f7560a7eec9011b10454d36e2de93d4f28b2c11b5661e.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
033234b66901bd96483f7560a7eec9011b10454d36e2de93d4f28b2c11b5661e.doc
Resource
win10v2004-20240226-en
General
-
Target
033234b66901bd96483f7560a7eec9011b10454d36e2de93d4f28b2c11b5661e.doc
-
Size
905KB
-
MD5
c1dc19c7e9dc17f92fe83d59bd21138d
-
SHA1
950c3fe1fcb0066b028ed6a1c53da2a3b98017f3
-
SHA256
033234b66901bd96483f7560a7eec9011b10454d36e2de93d4f28b2c11b5661e
-
SHA512
d15a1b4e7ce6f7783ae7512c5506d1233c92bf646a641ed7d6c7e8df5ad61725f41eef2c473994abbc12f8d09c4e12e91bf9706b230ba152a3296e8f5fdeaea7
-
SSDEEP
12288:BF9ADbOO5TBab+JQJpIsFdmHrmcpunzvQoi+mOL:v9ATJlmJpxmH1TkmOL
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 740 WINWORD.EXE 740 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE 740 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\033234b66901bd96483f7560a7eec9011b10454d36e2de93d4f28b2c11b5661e.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:740