Analysis

  • max time kernel
    71s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    10-05-2021 23:29

General

  • Target

    46c15fa7bfa39d2beef250ada9dbee211dd632dfc80bde513d934002ae663f03.doc

  • Size

    46KB

  • MD5

    92fc5df18a99dcc81c00e2f470196c6b

  • SHA1

    7f89cced469c8a597b40c1b8c947fc0fee6f57bb

  • SHA256

    46c15fa7bfa39d2beef250ada9dbee211dd632dfc80bde513d934002ae663f03

  • SHA512

    5816601fcdd94bb35dd24937c6a20e635fe7e9d787c7e435f79d4b3251930430a68b62c8591118167f7147059de74e4f03db10481aaca55970d92982aa89eb37

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\46c15fa7bfa39d2beef250ada9dbee211dd632dfc80bde513d934002ae663f03.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:508
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:548

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\MSO1033.acl
      MD5

      37c61c4bac6a52e0f9553c2519c0739d

      SHA1

      126f3a3415f46f8b4e4b32858f79a251fdf20f2c

      SHA256

      bda6607e735f924a16e9a862278994f339a082a9e7e97679503aff8f56e67c40

      SHA512

      8bdb2c83f7e37767179230a52e05d05d4ed6e456ca2603393961e22e3f7b00c0896532365b1d45ee7dbaaff716fae0fe8182b30d6f72864d5a2e7dbd4afacbff

    • memory/508-67-0x0000000000000000-mapping.dmp
    • memory/508-68-0x000007FEFB891000-0x000007FEFB893000-memory.dmp
      Filesize

      8KB

    • memory/548-69-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1944-59-0x0000000072441000-0x0000000072444000-memory.dmp
      Filesize

      12KB

    • memory/1944-60-0x000000006FEC1000-0x000000006FEC3000-memory.dmp
      Filesize

      8KB

    • memory/1944-61-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1944-62-0x0000000005DC0000-0x0000000006A0A000-memory.dmp
      Filesize

      12.3MB