Resubmissions

02-03-2021 12:15

210302-fjzt6bjwt6 8

02-03-2021 11:37

210302-2mz8x99gnj 8

Analysis

  • max time kernel
    69s
  • max time network
    66s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    02-03-2021 11:37

General

  • Target

    tipologi_7517732.doc

  • Size

    211KB

  • MD5

    ccc252df3db14bf7c1a1a1a8ff610b84

  • SHA1

    861b425171be9e0780168f74e116cce0a91f13f0

  • SHA256

    5f057426c2556956425ce0d19002e72801c0b2faa72b775490d6565146120b4a

  • SHA512

    d1a9ba25988c7d49ee8a96b7ba6066e3eb7556f4f11bc5d36480521d94cb04cb20f5c0040881839d73c813e168be7452716fb068507aa73ddc1281f541a95a1a

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\tipologi_7517732.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1932

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1436-5-0x000007FEF5BC0000-0x000007FEF5E3A000-memory.dmp
    Filesize

    2.5MB

  • memory/1932-2-0x0000000071EA1000-0x0000000071EA4000-memory.dmp
    Filesize

    12KB

  • memory/1932-3-0x000000006F921000-0x000000006F923000-memory.dmp
    Filesize

    8KB

  • memory/1932-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1932-6-0x0000000006080000-0x0000000006082000-memory.dmp
    Filesize

    8KB