Analysis

  • max time kernel
    100s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2022 12:11

General

  • Target

    809659f90b5f3edc664bbf98e7aa1d87e4d5e24c364a787cda1a6d7dec9dea19.doc

  • Size

    37KB

  • MD5

    49cc9334922660aa05b41f4e0b3a4db0

  • SHA1

    363d353b657f8c33224f67272f2376d90f89022b

  • SHA256

    809659f90b5f3edc664bbf98e7aa1d87e4d5e24c364a787cda1a6d7dec9dea19

  • SHA512

    8f2e1fffe198f8b2c006ad7ae46d3165af5fc1b78d21244b4db23a64b3ad5a43e98f276b786dcba25596c5ad58dccb873221df59753209cda89dee4a4105251f

  • SSDEEP

    384:ewH1+1LtGTFP3bLfFOCjoElwurOm2iqawzhSvr9w6iTJB:P1+1JGhP3vF/qurOmsYr9w68

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\809659f90b5f3edc664bbf98e7aa1d87e4d5e24c364a787cda1a6d7dec9dea19.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:980

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/980-58-0x0000000000000000-mapping.dmp

    • memory/980-60-0x000007FEFC161000-0x000007FEFC163000-memory.dmp

      Filesize

      8KB

    • memory/1196-54-0x0000000072C51000-0x0000000072C54000-memory.dmp

      Filesize

      12KB

    • memory/1196-55-0x00000000706D1000-0x00000000706D3000-memory.dmp

      Filesize

      8KB

    • memory/1196-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1196-57-0x0000000075D01000-0x0000000075D03000-memory.dmp

      Filesize

      8KB

    • memory/1196-59-0x00000000716BD000-0x00000000716C8000-memory.dmp

      Filesize

      44KB

    • memory/1196-61-0x00000000716BD000-0x00000000716C8000-memory.dmp

      Filesize

      44KB

    • memory/1196-62-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB