Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 04:12
Static task
static1
Behavioral task
behavioral1
Sample
c2b89117e4f6bf48e20c4d2af9d26edfdad737411d453fbd62c7356be200ff5f.doc
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c2b89117e4f6bf48e20c4d2af9d26edfdad737411d453fbd62c7356be200ff5f.doc
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
c2b89117e4f6bf48e20c4d2af9d26edfdad737411d453fbd62c7356be200ff5f.doc
-
Size
16KB
-
MD5
0dc62f3171319014c5170d66aff86233
-
SHA1
9b5f876bf03c85ff5ec684b69342c40a45ec34da
-
SHA256
c2b89117e4f6bf48e20c4d2af9d26edfdad737411d453fbd62c7356be200ff5f
-
SHA512
bb496dfdb9b8fecbce2e80931901610747c0049bb8885b57d8f5ae0e3bb40ac15e07b4879a6ff06c29f0f7330d52ac7962e0b8a06d0ba066466e9c6aed2ad6e3
Score
1/10
Malware Config
Signatures
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1336 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
Processes:
WINWORD.EXEpid process 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE 1336 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c2b89117e4f6bf48e20c4d2af9d26edfdad737411d453fbd62c7356be200ff5f.doc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1336-54-0x0000000072171000-0x0000000072174000-memory.dmpFilesize
12KB
-
memory/1336-55-0x000000006FBF1000-0x000000006FBF3000-memory.dmpFilesize
8KB
-
memory/1336-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1336-57-0x0000000074B51000-0x0000000074B53000-memory.dmpFilesize
8KB
-
memory/1336-58-0x0000000070BDD000-0x0000000070BE8000-memory.dmpFilesize
44KB