Resubmissions

21-02-2021 18:06

210221-8wax7qzvqx 8

21-02-2021 18:00

210221-vjzsylyfz2 8

21-02-2021 17:56

210221-ae84tv1r2n 8

10-02-2021 15:47

210210-9b99yvj8es 8

10-02-2021 14:59

210210-9m2qxt96q6 8

10-02-2021 14:53

210210-kg5v21dqj6 8

10-02-2021 14:51

210210-z793ybymhe 8

10-02-2021 14:49

210210-vejqem8yk2 8

10-02-2021 14:45

210210-4vmkq6d3bx 8

10-02-2021 14:12

210210-h2rcklwkns 8

Analysis

  • max time kernel
    69s
  • max time network
    14s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-02-2021 14:49

General

  • Target

    IAHRA.doc

  • Size

    90KB

  • MD5

    026e53d4cabe762ed84fafdd6243483d

  • SHA1

    e9f07fd33d7dd014015d018f9d7abe0fb489bb95

  • SHA256

    dd223178e1a516f428a2bcfa790a49eb437651d648fee4d7441dc106cf04df3a

  • SHA512

    0025ebcf6705effde6b20af658cd441aca51cf9c438ba56909de5ca5bb99f1cee561cde0f16003380dfa4058511c68c65fbaafb805ff147728eebe4fc09a98ba

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\IAHRA.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1900

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1684-2-0x0000000072DC1000-0x0000000072DC4000-memory.dmp

      Filesize

      12KB

    • memory/1684-3-0x0000000070841000-0x0000000070843000-memory.dmp

      Filesize

      8KB

    • memory/1684-4-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1900-5-0x0000000000000000-mapping.dmp

    • memory/1900-6-0x000007FEFC2C1000-0x000007FEFC2C3000-memory.dmp

      Filesize

      8KB