Analysis
-
max time kernel
147s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 04:18
Static task
static1
Behavioral task
behavioral1
Sample
7a797de807b79e505026ec526a61a406be19d10b651db203df6c72df37ed771c.doc
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
7a797de807b79e505026ec526a61a406be19d10b651db203df6c72df37ed771c.doc
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
7a797de807b79e505026ec526a61a406be19d10b651db203df6c72df37ed771c.doc
-
Size
10KB
-
MD5
7c7c5a20e758346f5cfbaff1343485f2
-
SHA1
f0c65c3df4276ebe3e30269d7387005e38ebcb8e
-
SHA256
7a797de807b79e505026ec526a61a406be19d10b651db203df6c72df37ed771c
-
SHA512
9281d8af9f65fdba147933f4781a716bb7027ace01e03fd0ace33930dbd9c90baa323ae6d45619ed187e6539712179df2675f753accf291871aa341e847f7c98
Score
1/10
Malware Config
Signatures
-
Processes:
WINWORD.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1724 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
WINWORD.EXEpid process 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7a797de807b79e505026ec526a61a406be19d10b651db203df6c72df37ed771c.doc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1724-54-0x0000000072E21000-0x0000000072E24000-memory.dmpFilesize
12KB
-
memory/1724-55-0x00000000708A1000-0x00000000708A3000-memory.dmpFilesize
8KB
-
memory/1724-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1724-57-0x00000000769D1000-0x00000000769D3000-memory.dmpFilesize
8KB
-
memory/1724-58-0x000000007188D000-0x0000000071898000-memory.dmpFilesize
44KB