Analysis
-
max time kernel
206s -
max time network
243s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:26
Static task
static1
Behavioral task
behavioral1
Sample
0c1ab6b7f745324bf025220e709df20252bd7417dca5374aeaa7c8e14f9fe57e.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0c1ab6b7f745324bf025220e709df20252bd7417dca5374aeaa7c8e14f9fe57e.doc
Resource
win10v2004-20221111-en
General
-
Target
0c1ab6b7f745324bf025220e709df20252bd7417dca5374aeaa7c8e14f9fe57e.doc
-
Size
77KB
-
MD5
7738fb3dfffca13ab83234a941e89ac3
-
SHA1
be5ec177eac461c72ae6fb7e94bfdb4e285f61ca
-
SHA256
0c1ab6b7f745324bf025220e709df20252bd7417dca5374aeaa7c8e14f9fe57e
-
SHA512
815adef7b95b071224e526ee2074cd1301015fbe506c6ea6c936d7360d971d51e77e6411246b00a9ccd3ae0dd2c82d563068610b6b56efafc47e5548a5cd5cf9
-
SSDEEP
1536:hMFVFF8qA0UtH0265UkTHn4vm3GVxVgg+6pyux:hMFVFF8qA0UtH02619GVxVgg+Qyux
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4036 WINWORD.EXE 4036 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
WINWORD.EXEpid process 4036 WINWORD.EXE 4036 WINWORD.EXE 4036 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0c1ab6b7f745324bf025220e709df20252bd7417dca5374aeaa7c8e14f9fe57e.doc" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4036
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4036-132-0x00007FFBACEB0000-0x00007FFBACEC0000-memory.dmpFilesize
64KB
-
memory/4036-133-0x00007FFBACEB0000-0x00007FFBACEC0000-memory.dmpFilesize
64KB
-
memory/4036-134-0x00007FFBACEB0000-0x00007FFBACEC0000-memory.dmpFilesize
64KB
-
memory/4036-135-0x00007FFBACEB0000-0x00007FFBACEC0000-memory.dmpFilesize
64KB
-
memory/4036-136-0x00007FFBACEB0000-0x00007FFBACEC0000-memory.dmpFilesize
64KB
-
memory/4036-137-0x00007FFBAA790000-0x00007FFBAA7A0000-memory.dmpFilesize
64KB
-
memory/4036-138-0x00007FFBAA790000-0x00007FFBAA7A0000-memory.dmpFilesize
64KB