Analysis
-
max time kernel
101s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 04:44
Behavioral task
behavioral1
Sample
f456727n24.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f456727n24.doc
Resource
win10v2004-20240802-en
General
-
Target
f456727n24.doc
-
Size
188KB
-
MD5
9f8e7fdcef0d27b7bc61603485bf1610
-
SHA1
e0fe4a3e401c0c57e8f8114d2073899e26a7c95e
-
SHA256
24199bf0c44800c1d7c22246ecfbe0f572e52047e442842d100c99b9e9be4a58
-
SHA512
82223d6d6f1f2f9535ee111c793ddab370c973fa14c8b4029821cdbed0e451989f55991233594bf9f3f0d2ad10ec72bc76b6feaa2665028913beb48c72ac3993
-
SSDEEP
1536:SlDxk5h4AmBZtIfQMkDswj2qEc7XE88LNn21oN:mDntIffkvQ21oN
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3372 WINWORD.EXE 3372 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f456727n24.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD50b961bc90b7af2027b563454155dc657
SHA180e38a8c676407e5c1501ee9d6881015cb149ef3
SHA25667485774afdeb3fd0beaef9de07138c2189b018a31b51a6289fdbd79564f2aa3
SHA5125af202273d136ac5437d1aa6b85b814de5140ee2c3ec667c0e8ea2c3b812291e2f94d8614821c504fd5ff8abc7b0c3abec4c64ff65d4749583156dd15e9932c5