Analysis

  • max time kernel
    102s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2022, 19:43

General

  • Target

    Interview with Luis(Cryptopop) preview.docx

  • Size

    11KB

  • MD5

    6f9ada13f38aa43f66c1bf938dd5d75a

  • SHA1

    af7eff8d346183058421e31285a8518555ebd842

  • SHA256

    bf2ea87b4bf70b50eef4e9ab49ef2306e308a304405eb14462714d10e7513d94

  • SHA512

    a445bd560d2cc801377399ed084b10544ff0c1f5b03625390d779038d2de8e2b2d5387bade8989feb08c932e046df32e7299f6d3e08f673fe7aae8f2c0381f0b

  • SSDEEP

    192:xp6LvLxMtp4H8I9u6C8o4J7IfI6I+B1Duvh7x3Y8/6lw+E4cayUZsGI1OHEvxR/t:xsvLGCucJ7IZDuZ74lI4c9RX2E

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Interview with Luis(Cryptopop) preview.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1720

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/832-54-0x0000000072F11000-0x0000000072F14000-memory.dmp

      Filesize

      12KB

    • memory/832-55-0x0000000070991000-0x0000000070993000-memory.dmp

      Filesize

      8KB

    • memory/832-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/832-57-0x0000000075921000-0x0000000075923000-memory.dmp

      Filesize

      8KB

    • memory/832-58-0x000000007197D000-0x0000000071988000-memory.dmp

      Filesize

      44KB

    • memory/832-61-0x000000007197D000-0x0000000071988000-memory.dmp

      Filesize

      44KB

    • memory/832-62-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/832-63-0x000000007197D000-0x0000000071988000-memory.dmp

      Filesize

      44KB

    • memory/1720-60-0x000007FEFC371000-0x000007FEFC373000-memory.dmp

      Filesize

      8KB