Analysis
-
max time kernel
146s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 04:12
Static task
static1
Behavioral task
behavioral1
Sample
cb922894e59f39993c948451c4cfe52ca86f119c402b9ea97a12f85f9ea7a324.doc
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
cb922894e59f39993c948451c4cfe52ca86f119c402b9ea97a12f85f9ea7a324.doc
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
cb922894e59f39993c948451c4cfe52ca86f119c402b9ea97a12f85f9ea7a324.doc
-
Size
154KB
-
MD5
e88a35275afb414f6684a29d837ec274
-
SHA1
cc5e189dfd12d62c29625d97cffbab4e9438ad2a
-
SHA256
cb922894e59f39993c948451c4cfe52ca86f119c402b9ea97a12f85f9ea7a324
-
SHA512
b5f11e400fb40b1fd65994b120b9bac06bf22c843b6a9df820792a0bc69d05bf2f46e14f163ae1586e34133f3415d0ac38cf810ee9f8b5a43b941f489be9d0f6
Score
1/10
Malware Config
Signatures
-
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1492 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
WINWORD.EXEpid process 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\cb922894e59f39993c948451c4cfe52ca86f119c402b9ea97a12f85f9ea7a324.doc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1492-54-0x0000000072C01000-0x0000000072C04000-memory.dmpFilesize
12KB
-
memory/1492-55-0x0000000070681000-0x0000000070683000-memory.dmpFilesize
8KB
-
memory/1492-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1492-57-0x00000000762C1000-0x00000000762C3000-memory.dmpFilesize
8KB
-
memory/1492-58-0x000000007166D000-0x0000000071678000-memory.dmpFilesize
44KB