Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
6bf8be5e615a2d4246d57156099c21cd386aedee56d0635c2ab9a2f6e7af72c8.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6bf8be5e615a2d4246d57156099c21cd386aedee56d0635c2ab9a2f6e7af72c8.doc
Resource
win10v2004-20231215-en
General
-
Target
6bf8be5e615a2d4246d57156099c21cd386aedee56d0635c2ab9a2f6e7af72c8.doc
-
Size
3.1MB
-
MD5
dd8ae0cc7e4bf16eb9e41b41d608dcff
-
SHA1
aebd41794a5c8f84f8898491c750377beb110113
-
SHA256
6bf8be5e615a2d4246d57156099c21cd386aedee56d0635c2ab9a2f6e7af72c8
-
SHA512
297a76253c8d3f07afc8e314a7a70e34215ff0103af642a1daafea7bd3535839bde54252e864647354e6cb3a72d7681e3974ebef7651551f2d6fb772a3baca4c
-
SSDEEP
49152:1AUD/KWQpu0rX7WRwbnjbjMiMXp6qIyy4PYsPm:1Qzfjb2J8sPm
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2044 WINWORD.EXE 2044 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE 2044 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6bf8be5e615a2d4246d57156099c21cd386aedee56d0635c2ab9a2f6e7af72c8.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2044