Analysis
-
max time kernel
303s -
max time network
15s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
23-09-2020 14:42
Static task
static1
Behavioral task
behavioral1
Sample
boq_6_boq.doc
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
boq_6_boq.doc
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
General
-
Target
boq_6_boq.doc
-
Size
684KB
-
MD5
4913959946c7c8d9ff682439eb108928
-
SHA1
2e77f1b7c588d274bd998dc6dda422363cc6f9ba
-
SHA256
052c9196dfe764f1fbd3850d706d10601235dc266d1151c93d34454a12206c28
-
SHA512
b74c1b001c628bc762eda6d724b674b8951380d8eb1e94fdfc59852b67e851b8ca670905e565467431c5c8b0282fe5f6c9f4ba8f0ce41840530959c13ce1c595
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1420 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1420 WINWORD.EXE 1420 WINWORD.EXE
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1420-0-0x0000000006720000-0x0000000006724000-memory.dmpFilesize
16KB
-
memory/1420-1-0x0000000007720000-0x00000000077CC000-memory.dmpFilesize
688KB
-
memory/1420-2-0x0000000006720000-0x0000000006724000-memory.dmpFilesize
16KB
-
memory/1420-5-0x0000000006720000-0x0000000006724000-memory.dmpFilesize
16KB