Analysis

  • max time kernel
    148s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 04:13

General

  • Target

    85b3f137a1982946d87baa0ba6e06d79ba7d79560e99469842249f7c4f7179fb.doc

  • Size

    11KB

  • MD5

    f4fc7719242c3670869af29d3e846515

  • SHA1

    11514d4d4863977e7817bc9bd205eb69d49c4183

  • SHA256

    85b3f137a1982946d87baa0ba6e06d79ba7d79560e99469842249f7c4f7179fb

  • SHA512

    611e9aec55ad86627f4924e73bbb43b3c4233cdb16b4f955a5bb47d622c1b941704841f6470c1a5d76d09f973dce533052ca25d44d26d43bd83bf41e153a903f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\85b3f137a1982946d87baa0ba6e06d79ba7d79560e99469842249f7c4f7179fb.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:836

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/836-54-0x0000000072491000-0x0000000072494000-memory.dmp
    Filesize

    12KB

  • memory/836-55-0x000000006FF11000-0x000000006FF13000-memory.dmp
    Filesize

    8KB

  • memory/836-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/836-57-0x0000000075721000-0x0000000075723000-memory.dmp
    Filesize

    8KB

  • memory/836-58-0x0000000070EFD000-0x0000000070F08000-memory.dmp
    Filesize

    44KB