Analysis

  • max time kernel
    69s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    12-03-2021 10:17

General

  • Target

    6f6bff5795d6e32656ae0a254d3c4052181e04390fe6d1740d9c85392a5d280a.doc

  • Size

    75KB

  • MD5

    ccff11a06fd0bf7de414bec5e6f17e7a

  • SHA1

    382cb6b008f21f182a79197a40c9bcfb4effed75

  • SHA256

    6f6bff5795d6e32656ae0a254d3c4052181e04390fe6d1740d9c85392a5d280a

  • SHA512

    9bf56036731a7790ba4e1019297d7f5090506e7db0cf88b5d88eb7c360bb75e5cde4819a9b4669cde821a77181daa8d275981171935ae171916671da3e5a4c84

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6f6bff5795d6e32656ae0a254d3c4052181e04390fe6d1740d9c85392a5d280a.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1684

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-2-0x0000000072DC1000-0x0000000072DC4000-memory.dmp
    Filesize

    12KB

  • memory/1684-3-0x0000000070841000-0x0000000070843000-memory.dmp
    Filesize

    8KB

  • memory/1684-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1684-6-0x00000000068F0000-0x00000000068F1000-memory.dmp
    Filesize

    4KB

  • memory/1684-5-0x00000000060E0000-0x00000000060E2000-memory.dmp
    Filesize

    8KB