Analysis

  • max time kernel
    100s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    11-04-2022 12:16

General

  • Target

    =?iso-8859-9?Q?Agenda-G=FCndem_(TR).docx

  • Size

    12KB

  • MD5

    742dc1935ed6ec42cd09a6a275635a59

  • SHA1

    69332694ef24751d80f3f8cbbecd393f458c4352

  • SHA256

    52830d8dc714135ab7aae7e4e00d0e4ae91e83ae213016ddac12b20401f22ac0

  • SHA512

    05eb8b228bc91d7ba4a479be5f16eff135745fabd746e9bf9cc8f246e94cc7ba0ef49a9dbc47e9b2fb3b77ba8afbec5eb305b167e095529781e9d881e137f4dd

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\=_iso-8859-9_Q_Agenda-G=FCndem_(TR).docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2032

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1368-54-0x0000000072991000-0x0000000072994000-memory.dmp
      Filesize

      12KB

    • memory/1368-55-0x0000000070411000-0x0000000070413000-memory.dmp
      Filesize

      8KB

    • memory/1368-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1368-57-0x0000000076631000-0x0000000076633000-memory.dmp
      Filesize

      8KB

    • memory/1368-58-0x00000000713FD000-0x0000000071408000-memory.dmp
      Filesize

      44KB

    • memory/1368-61-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2032-59-0x0000000000000000-mapping.dmp
    • memory/2032-60-0x000007FEFBEA1000-0x000007FEFBEA3000-memory.dmp
      Filesize

      8KB