Analysis

  • max time kernel
    91s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    02-03-2021 09:29

General

  • Target

    dettagl_2929309.doc

  • Size

    210KB

  • MD5

    bd42c72f01bf9b7b6b6562103f8ade20

  • SHA1

    06146ec4978602f673898f1e89ce3bcbee0eeed0

  • SHA256

    f7fc36b5943f0ebf81bf84f99c41dd871e23db810051656ad12545b4bcc6d403

  • SHA512

    2f7a49e0f585ae9c6f6c8c71641d3f6bd881395107bc8fa7f89ff1df35ee2ac5bcc45ad79d37cc9ab1ea7296f1b87d86e5c4ef0bb16dd4db2b838d1dd17094c0

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dettagl_2929309.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:276

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/276-2-0x00000000728E1000-0x00000000728E4000-memory.dmp
    Filesize

    12KB

  • memory/276-3-0x0000000070361000-0x0000000070363000-memory.dmp
    Filesize

    8KB

  • memory/276-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/276-6-0x0000000006280000-0x0000000006282000-memory.dmp
    Filesize

    8KB

  • memory/1688-5-0x000007FEF63D0000-0x000007FEF664A000-memory.dmp
    Filesize

    2.5MB