Analysis

  • max time kernel
    141s
  • max time network
    6s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    28-05-2020 18:07

General

  • Target

    df48b61067c1c0aa29c3733db29074f91507d09c9d071e2ed48ecc9b996ffd2c.doc

  • Size

    228KB

  • MD5

    60ea95fea02befd8b01d18ec5eef2ec2

  • SHA1

    f8e9ec2f7db552c08e00d605773435cc626702aa

  • SHA256

    df48b61067c1c0aa29c3733db29074f91507d09c9d071e2ed48ecc9b996ffd2c

  • SHA512

    0ad082442a9241189a6909ac4e669003f215a1caae83159b67b50832077b1bdd2409fec31b1411c3f3d88c79508c0f0f860823b897e6b6381df3b3cd37b42444

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\df48b61067c1c0aa29c3733db29074f91507d09c9d071e2ed48ecc9b996ffd2c.doc"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    PID:1524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1524-0-0x0000000007470000-0x0000000007670000-memory.dmp
    Filesize

    2.0MB

  • memory/1524-1-0x0000000007470000-0x0000000007670000-memory.dmp
    Filesize

    2.0MB

  • memory/1524-2-0x0000000007470000-0x0000000007670000-memory.dmp
    Filesize

    2.0MB