Analysis
-
max time kernel
146s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 21:29
Behavioral task
behavioral1
Sample
a400a0803e94fba57adfc86b0b3024ef.doc
Resource
win7-20220901-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a400a0803e94fba57adfc86b0b3024ef.doc
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
a400a0803e94fba57adfc86b0b3024ef.doc
-
Size
22KB
-
MD5
a400a0803e94fba57adfc86b0b3024ef
-
SHA1
56c3f647529187f6e2684bc432a3da96331c6be5
-
SHA256
a7f75d39c51724a7e40af356a53d50cb6f62be34d647f70a458957c6da420bc0
-
SHA512
b9090f5d4745bbabd2f145d52b29fa805e39e739d8466310eb7a88fe4ce9941e9eda1eb69ae5c78d56dc88978f165ec9c239a4f0d66d36c8e6365e41fcff4f50
-
SSDEEP
384:li82WLC+pek/igrPZtFUdX6nXkyzQ/+DQj2gfQ/MBl:s+pekqOZtFUdXEW+zYBH
Score
1/10
Malware Config
Signatures
-
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1264 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
WINWORD.EXEpid process 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE 1264 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a400a0803e94fba57adfc86b0b3024ef.doc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1264-54-0x00000000724D1000-0x00000000724D4000-memory.dmpFilesize
12KB
-
memory/1264-55-0x000000006FF51000-0x000000006FF53000-memory.dmpFilesize
8KB
-
memory/1264-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1264-57-0x0000000075601000-0x0000000075603000-memory.dmpFilesize
8KB
-
memory/1264-58-0x0000000070F3D000-0x0000000070F48000-memory.dmpFilesize
44KB