Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 19:49
Behavioral task
behavioral1
Sample
0b569850b8cb6ddcdb1c8fbfce4d8f123ddcf26bf8ac339c1da6c83d92c34ccd.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0b569850b8cb6ddcdb1c8fbfce4d8f123ddcf26bf8ac339c1da6c83d92c34ccd.doc
Resource
win10v2004-20240704-en
General
-
Target
0b569850b8cb6ddcdb1c8fbfce4d8f123ddcf26bf8ac339c1da6c83d92c34ccd.doc
-
Size
37KB
-
MD5
be087bc1705507e27e92a7ab6b103460
-
SHA1
0b8c3b1792e94f6865e1f626e65daf38d56d802a
-
SHA256
0b569850b8cb6ddcdb1c8fbfce4d8f123ddcf26bf8ac339c1da6c83d92c34ccd
-
SHA512
c2c1b645043ae75fc810da07b607a0897de4fa1cf506f68e022ce5ccbf1d97e51ffd6af11b48c4ff6ba106ffd78a8b89efb11f19cf886362441367eab1803432
-
SSDEEP
768:wlMeJY5xmZ83Mb6SeRm9nKkjhT3YZwS1yw3Ys4:wAe09mlHV3YZwS1yw3Ys4
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 60 WINWORD.EXE 60 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE 60 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0b569850b8cb6ddcdb1c8fbfce4d8f123ddcf26bf8ac339c1da6c83d92c34ccd.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:60