Analysis
-
max time kernel
61s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 21:18
Behavioral task
behavioral1
Sample
92073233ee5c64cca43853633950021459077cf4891a172c629d79f66ec9c891.docm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
92073233ee5c64cca43853633950021459077cf4891a172c629d79f66ec9c891.docm
Resource
win10v2004-20240226-en
General
-
Target
92073233ee5c64cca43853633950021459077cf4891a172c629d79f66ec9c891.docm
-
Size
206KB
-
MD5
8fdb689d70efaf7026986612283eb651
-
SHA1
27332d4043f10744a86b023181e1e8cfa2b2f62a
-
SHA256
92073233ee5c64cca43853633950021459077cf4891a172c629d79f66ec9c891
-
SHA512
b782042ae737f7bc84cd834c41fc3480224eb16ca6900a8c1cbab61abc8c8b22e73e2267ba74f4fffd53558f325b908ff6ee7125b022032ef47f421773c511cc
-
SSDEEP
6144:G/HHHRzJky3eEGVdajJ66tAhUJOO3NBfxsegI:GvnPkyuEGfMuhU7D5x
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2112 WINWORD.EXE 2112 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2112 WINWORD.EXE 2112 WINWORD.EXE 2112 WINWORD.EXE 2112 WINWORD.EXE 2112 WINWORD.EXE 2112 WINWORD.EXE 2112 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2112 wrote to memory of 316 2112 WINWORD.EXE 102 PID 2112 wrote to memory of 316 2112 WINWORD.EXE 102
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\92073233ee5c64cca43853633950021459077cf4891a172c629d79f66ec9c891.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://employeeportal.net-login.com/XMWF3Q1dlRld3anZ3MHRCa3d2NjNlbUdhcFdrZ29oNDNnMWVFYmpQSkJETlN6YUo0SjNmc0RTS3FremVqQUFDRWUxeVhsMWk0cENOOGc2RUt3KzM3bVZJdk9oemtyNXF2ZXczRnJhMHNrZkdpT1pZUkV3NktJUmVNNS83Q0RhemNhdCsyZ3dDdU05ancwb2IwOFdyMUJ5dFdSakU5UU04OW91OUp5SkpGQWZwZlZ4bm1CUHNEVnRwZ2QvckRVNXRCVWJMaC0tNitsS3d4a3lGdnIvUnFZKy0tbEtuUnB5R0tJYnhjdTlPb2twck5hdz09?cid=20891345352⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=2596 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:11⤵PID:1192
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4284 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:11⤵PID:4456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5868 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:4632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5040 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:11⤵PID:3428
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5524 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:11⤵PID:4912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5468 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:3096