Analysis
-
max time kernel
156s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 09:41
Behavioral task
behavioral1
Sample
f5208159e44475e5cb1f079673de213934be7ff180b91a04a4f57965211b6710.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5208159e44475e5cb1f079673de213934be7ff180b91a04a4f57965211b6710.doc
Resource
win10v2004-20240226-en
General
-
Target
f5208159e44475e5cb1f079673de213934be7ff180b91a04a4f57965211b6710.doc
-
Size
212KB
-
MD5
1144d4a771054e79744779e67cbd35d3
-
SHA1
afb12d2b2d75049b68387eab511e0d9facecbfd6
-
SHA256
f5208159e44475e5cb1f079673de213934be7ff180b91a04a4f57965211b6710
-
SHA512
81602403585dc9922c42825ace3ffb4661dd2749abf1003d2b72a956937e94d5ddfd47cbfaffe4a588c0226f77ae0f8966f43c987273e0ef086509233e1646e0
-
SSDEEP
6144:kSCjs86md8R67juzwtA3X/ZCGNrKGsLrn1qSaHYrH/:ZCjsl68R6HuzwtUhCGNrKGsLrn1qSaHU
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4072 WINWORD.EXE 4072 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE 4072 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f5208159e44475e5cb1f079673de213934be7ff180b91a04a4f57965211b6710.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3548 --field-trial-handle=2264,i,7010714054498059916,1862725710331979271,262144 --variations-seed-version /prefetch:81⤵PID:1272