Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    03-11-2021 16:36

General

  • Target

    1103_2096072643613.doc

  • Size

    575KB

  • MD5

    3247dab6d560e5cf05bbe610c3f92da6

  • SHA1

    824cd25d1cc8b8092f90dc6dfc80f867caae49eb

  • SHA256

    795469e3d20d8b1e85816f14cd122796ca9dfe2947a4c9fe1464d62900f10d52

  • SHA512

    50872742f94e6ecf3b2ead4500b105ff9ee3c3c36c34dc1510d15957b1a5c2bc213203147b1b8f3a42eb6d58b8dcbc0d6597e2fe7c83fe5981b8b76c129ad3c2

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1103_2096072643613.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:688

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/688-60-0x000007FEFB561000-0x000007FEFB563000-memory.dmp

      Filesize

      8KB

    • memory/1584-55-0x0000000072101000-0x0000000072104000-memory.dmp

      Filesize

      12KB

    • memory/1584-56-0x000000006FB81000-0x000000006FB83000-memory.dmp

      Filesize

      8KB

    • memory/1584-57-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1584-58-0x0000000074F21000-0x0000000074F23000-memory.dmp

      Filesize

      8KB