Analysis

  • max time kernel
    4294205s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    05-03-2022 20:46

General

  • Target

    18cf2e39efca29316e84dab1be885a77c600c40d6bb65cd016b6de9d3fd0a6da.doc

  • Size

    461KB

  • MD5

    dcc62d1c27043d6ecededefd5dec8fa2

  • SHA1

    203bbea4dfd1ad3f91c5a177dfbb84d8f3235f09

  • SHA256

    18cf2e39efca29316e84dab1be885a77c600c40d6bb65cd016b6de9d3fd0a6da

  • SHA512

    6b5a957bdad86e5efc4ecc916b314dd190873d2d77af2560bde6f660785588c054857b983c7243c6f54b3990729916bfc1dc96f042ec37e2429574c04a418939

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\18cf2e39efca29316e84dab1be885a77c600c40d6bb65cd016b6de9d3fd0a6da.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1648
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll,UninstallFont
        2⤵
        • Process spawned unexpected child process
        PID:1964

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1144-69-0x0000000000529000-0x000000000052D000-memory.dmp

      Filesize

      16KB

    • memory/1144-56-0x000000002F070000-0x000000002F1CD000-memory.dmp

      Filesize

      1.4MB

    • memory/1144-65-0x0000000000529000-0x000000000052D000-memory.dmp

      Filesize

      16KB

    • memory/1144-57-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1144-58-0x0000000075281000-0x0000000075283000-memory.dmp

      Filesize

      8KB

    • memory/1144-64-0x0000000000529000-0x000000000052D000-memory.dmp

      Filesize

      16KB

    • memory/1144-60-0x0000000070E7D000-0x0000000070E88000-memory.dmp

      Filesize

      44KB

    • memory/1144-61-0x0000000000529000-0x000000000052D000-memory.dmp

      Filesize

      16KB

    • memory/1144-66-0x0000000000529000-0x000000000052D000-memory.dmp

      Filesize

      16KB

    • memory/1144-63-0x0000000000529000-0x000000000052D000-memory.dmp

      Filesize

      16KB

    • memory/1144-76-0x000000000052B000-0x000000000052C000-memory.dmp

      Filesize

      4KB

    • memory/1144-55-0x000000006FE91000-0x000000006FE93000-memory.dmp

      Filesize

      8KB

    • memory/1144-62-0x0000000000529000-0x000000000052D000-memory.dmp

      Filesize

      16KB

    • memory/1144-67-0x0000000000529000-0x000000000052D000-memory.dmp

      Filesize

      16KB

    • memory/1144-68-0x0000000000529000-0x000000000052D000-memory.dmp

      Filesize

      16KB

    • memory/1144-54-0x0000000072411000-0x0000000072414000-memory.dmp

      Filesize

      12KB

    • memory/1144-72-0x000000000052B000-0x000000000052C000-memory.dmp

      Filesize

      4KB

    • memory/1144-71-0x000000000052A000-0x000000000052B000-memory.dmp

      Filesize

      4KB

    • memory/1144-73-0x00000000063E1000-0x00000000063E2000-memory.dmp

      Filesize

      4KB

    • memory/1144-74-0x0000000000529000-0x000000000052D000-memory.dmp

      Filesize

      16KB

    • memory/1144-77-0x00000000063E1000-0x00000000063E2000-memory.dmp

      Filesize

      4KB

    • memory/1648-59-0x000007FEFB871000-0x000007FEFB873000-memory.dmp

      Filesize

      8KB