Analysis

  • max time kernel
    100s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 23:49

General

  • Target

    eec096f459f30219b7d0d95e8fea92e969d242a3faf8fd0db1213a359de775b9.doc

  • Size

    40KB

  • MD5

    633592b8a8e9bbf0368e9923585b2a12

  • SHA1

    4a9f12fa5af2350882189d46296c1dae96957299

  • SHA256

    eec096f459f30219b7d0d95e8fea92e969d242a3faf8fd0db1213a359de775b9

  • SHA512

    bf16f05999b09ecb99f3b503c11a9745f31f875e52a48fe6e9da326a657f3af218ab31a3586f23b902e148ded1bee021aec9bda1a470360669ab3da295363cdc

  • SSDEEP

    384:a/HBczeeSSiClWJoooQmOan3sm3Zk/MMMMy5:chJyn3JJJ

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\eec096f459f30219b7d0d95e8fea92e969d242a3faf8fd0db1213a359de775b9.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1240

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1240-60-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmp

      Filesize

      8KB

    • memory/1928-54-0x0000000072A71000-0x0000000072A74000-memory.dmp

      Filesize

      12KB

    • memory/1928-55-0x00000000704F1000-0x00000000704F3000-memory.dmp

      Filesize

      8KB

    • memory/1928-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1928-57-0x0000000075E11000-0x0000000075E13000-memory.dmp

      Filesize

      8KB

    • memory/1928-59-0x00000000714DD000-0x00000000714E8000-memory.dmp

      Filesize

      44KB

    • memory/1928-61-0x00000000714DD000-0x00000000714E8000-memory.dmp

      Filesize

      44KB

    • memory/1928-62-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1928-63-0x00000000714DD000-0x00000000714E8000-memory.dmp

      Filesize

      44KB