Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 11:27
Static task
static1
Behavioral task
behavioral1
Sample
POM21002942 5%--10%.rtf
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
POM21002942 5%--10%.rtf
Resource
win10v2004-20250129-en
General
-
Target
POM21002942 5%--10%.rtf
-
Size
627KB
-
MD5
958e0919556bcf8357e9c8a0dfd7cc51
-
SHA1
4c2183ef98684dd0cfd5203e8497b4922e5b836c
-
SHA256
3374b05b06900819a538deb1b0cb86a5b944f36ccc9dcaa07d82ff169966de0f
-
SHA512
0b6827a4907088fe5579ac3b6821826b73bc6a5a08f8073ab9b96f10080988a825983f9dbb8ef02265a0d21eec2f35bdb9d78437ff171a528f6d21bc01b81d46
-
SSDEEP
6144:uwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAy:7
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3224 WINWORD.EXE 3224 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3224 WINWORD.EXE 3224 WINWORD.EXE 3224 WINWORD.EXE 3224 WINWORD.EXE 3224 WINWORD.EXE 3224 WINWORD.EXE 3224 WINWORD.EXE 3224 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\POM21002942 5%--10%.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize5KB
MD55dd417204d444af31fa4a6b9b266315f
SHA1bcc860f6797ce515b383efdde81b821deed05698
SHA256e1da33fc5b909d2b0835a94b280706653f75775967c23985fa503fa3d12c6b0c
SHA51235b89f08ce0ad005d3f640adeb68b0e760b923db8fc56f2f74dbb5567aca5e4b70ea3e4f9d00ce703924d67a9858e5ca592bb8ac161a811894694748de68d3bc