Analysis
-
max time kernel
133s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 03:14
Static task
static1
Behavioral task
behavioral1
Sample
aca3d8614954a35938653f8a26effa4f96952d8227222ca57dda6ab7cd607424.docx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aca3d8614954a35938653f8a26effa4f96952d8227222ca57dda6ab7cd607424.docx
Resource
win10v2004-20241007-en
General
-
Target
aca3d8614954a35938653f8a26effa4f96952d8227222ca57dda6ab7cd607424.docx
-
Size
459KB
-
MD5
d2d23ccc53607370c926fe786f92c75b
-
SHA1
8a84a9083d5b1e26fb9d0374efec7b259a3d059b
-
SHA256
aca3d8614954a35938653f8a26effa4f96952d8227222ca57dda6ab7cd607424
-
SHA512
2a38f263819d6350fdcc7e12345d68dbb6745eedef50ac261b488f73e534e0cc568c0d7dd909ca1bc438e436a9148aaf0f38f86792d8a92c174faef37e4396ca
-
SSDEEP
6144:hdlcbR5HastSFXbqUAbqUAbqUvyLE8IIIIIW0ru0rqme6eeCe9vCeXhdYp9tmYL2:zARtUVhpr/rqIXM9mrm9Bt2mhW8G0Yf
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid Process 2992 WINWORD.EXE 2992 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WINWORD.EXEdescription pid Process Token: SeAuditPrivilege 2992 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid Process 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE 2992 WINWORD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\aca3d8614954a35938653f8a26effa4f96952d8227222ca57dda6ab7cd607424.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5f6e89e6c3ab17d8d58699ccefeaf3c8d
SHA186c245d0a2ef138aa7afca6bb43316e251b07c68
SHA25632f5bf26d32b42212ada3e88017ad037c6c84f760a64585252576d893a00ff5f
SHA512ab3a82dcd600c7169da373101593480a1ef8e82b2d339b5367f0e2b118f23ec3eb591a3e269de3f5d8b0e0843ec4574b33c5f98e0344c4be38a26c25caccb4b6
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
394B
MD57e3e9031f33be9ede0e29eebba781caa
SHA14f5d93e25523ef0a3d4d37e90efdcf3bad28e02f
SHA256b472964568aac7f5b0f4fc711d0f98f06d5d3c80d4fe3e2f0327e9b2a3119d0d
SHA51216735455729f74edc4dfb2441e713c494bb6f422599f774c6458ff3c5efa7c7648d20c3ed6d1b1e69385cad0ad65451ea2ee5bda09a06c26c4d92b5288dc3936
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5ba7e81e61de2b9edcfda42b1bdd30fd7
SHA1ded08ba91f09e75838968d6c5dc9f302df89a7af
SHA25672f2d4187c7a02ef31e75d4eb0483282af8255804f4e01cedfb3d7d3999a78d2
SHA5126dc5f1b443ff9a3a0267872e6f6bb52c9da390484c63b969fdd17720a63238b2b6eba05c6c8e753a5e557eee0c930b619e0d651ad5b980031de415e45514db74