Analysis

  • max time kernel
    134s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 09:47

General

  • Target

    9e01b0fc19d7a67842258746ca980fc84a4d3094bd06c08fbb78a789f4e72d62.docm

  • Size

    139KB

  • MD5

    433d8368920fe1347a09d0d33393366e

  • SHA1

    5e6ee5e84ed12646b6b4c1891736b530b8bf3194

  • SHA256

    9e01b0fc19d7a67842258746ca980fc84a4d3094bd06c08fbb78a789f4e72d62

  • SHA512

    c0a5751e1bc4faa871ae5a247eb84574ea20477566fb115ef248ae2935ad4321399af5c4dd61e2fbf37e903da13950d386bf33883ae5296eba69ee00586fc5e3

  • SSDEEP

    3072:RVwMX++GiFhJThZdOewHd5+XOYcaW7F+ZbJHPexa6J/FBaImxmFN6Tr:RVu+PhXi35+XOYMBSJH4VaBIN6P

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9e01b0fc19d7a67842258746ca980fc84a4d3094bd06c08fbb78a789f4e72d62.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2036

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-54-0x0000000072571000-0x0000000072574000-memory.dmp
    Filesize

    12KB

  • memory/2036-55-0x000000006FFF1000-0x000000006FFF3000-memory.dmp
    Filesize

    8KB

  • memory/2036-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/2036-57-0x0000000075521000-0x0000000075523000-memory.dmp
    Filesize

    8KB

  • memory/2036-58-0x0000000070FDD000-0x0000000070FE8000-memory.dmp
    Filesize

    44KB

  • memory/2036-59-0x0000000070FDD000-0x0000000070FE8000-memory.dmp
    Filesize

    44KB

  • memory/2036-60-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/2036-61-0x0000000070FDD000-0x0000000070FE8000-memory.dmp
    Filesize

    44KB