Analysis
-
max time kernel
264s -
max time network
329s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 11:27
Behavioral task
behavioral1
Sample
819d5cab86bbb85ae28f6801705098cf679b3398e9e5d5bc30d6a8a4912b4be3.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
819d5cab86bbb85ae28f6801705098cf679b3398e9e5d5bc30d6a8a4912b4be3.doc
Resource
win10v2004-20221111-en
General
-
Target
819d5cab86bbb85ae28f6801705098cf679b3398e9e5d5bc30d6a8a4912b4be3.doc
-
Size
62KB
-
MD5
52b11d6cd39c8ea9744655d191292cd6
-
SHA1
e3a3fa7e30d24552f5ccd64f62f241be520e165e
-
SHA256
819d5cab86bbb85ae28f6801705098cf679b3398e9e5d5bc30d6a8a4912b4be3
-
SHA512
4c0b976c931b5f544bb8ad5cf8eabfacc476763b2decf936de9761b504875c2313b5c9bdbaf080358789142ff9f954bf82e2f636f451495f62eeafcb06768d10
-
SSDEEP
768:eP4Y0XRqAPohDmW4hemHOVnt4w84UrmSjXgbbKi3tji7jP:cAqAPohzfV
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 4080 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WINWORD.EXEpid process 4080 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\819d5cab86bbb85ae28f6801705098cf679b3398e9e5d5bc30d6a8a4912b4be3.doc" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4080-132-0x00007FF9B3E30000-0x00007FF9B3E40000-memory.dmpFilesize
64KB
-
memory/4080-133-0x00007FF9B3E30000-0x00007FF9B3E40000-memory.dmpFilesize
64KB
-
memory/4080-134-0x00007FF9B3E30000-0x00007FF9B3E40000-memory.dmpFilesize
64KB
-
memory/4080-135-0x00007FF9B3E30000-0x00007FF9B3E40000-memory.dmpFilesize
64KB
-
memory/4080-136-0x00007FF9B3E30000-0x00007FF9B3E40000-memory.dmpFilesize
64KB
-
memory/4080-137-0x00007FF9B1DD0000-0x00007FF9B1DE0000-memory.dmpFilesize
64KB
-
memory/4080-138-0x00007FF9B1DD0000-0x00007FF9B1DE0000-memory.dmpFilesize
64KB