Analysis

  • max time kernel
    70s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2022, 17:12

General

  • Target

    ecc4849687b91dc656c8b8989e72db4544917f42ae00c1d3ece2c0caffb4ae8d.docx

  • Size

    23KB

  • MD5

    12972841001bf28f6f1d8324ed16625a

  • SHA1

    7761c96c911a7dbab2bec2358464d872241fc441

  • SHA256

    ecc4849687b91dc656c8b8989e72db4544917f42ae00c1d3ece2c0caffb4ae8d

  • SHA512

    fc28cd72976e2d98f01717914ecb8edf052da08e7845bf6d3d300403fe7f1fea95a1f02d8188d881113f20385ab3a218b361c3d37024788415d6ddb638d6ecae

  • SSDEEP

    384:d0hxI9Nn3N4ZI1NL09j+E+KjFmweCoDFiuccvpegZvjSKseZWehxq8:d0hCfnH1NL0YExRqRiuDv5j7seZzxL

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ecc4849687b91dc656c8b8989e72db4544917f42ae00c1d3ece2c0caffb4ae8d.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1788

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1096-54-0x0000000072D81000-0x0000000072D84000-memory.dmp

      Filesize

      12KB

    • memory/1096-55-0x0000000070801000-0x0000000070803000-memory.dmp

      Filesize

      8KB

    • memory/1096-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1096-57-0x0000000075ED1000-0x0000000075ED3000-memory.dmp

      Filesize

      8KB

    • memory/1096-58-0x00000000717ED000-0x00000000717F8000-memory.dmp

      Filesize

      44KB

    • memory/1096-61-0x00000000717ED000-0x00000000717F8000-memory.dmp

      Filesize

      44KB

    • memory/1788-60-0x000007FEFC291000-0x000007FEFC293000-memory.dmp

      Filesize

      8KB