Analysis

  • max time kernel
    148s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 12:16

General

  • Target

    72c652ce2b95a0d10d25b23343bf09e4324086b314118e25ba88ac6f719e3f2f.doc

  • Size

    51KB

  • MD5

    25f0b4b239643098855e8333ff265d10

  • SHA1

    6ea560315447cc77d0475bc7769afc61a963c9de

  • SHA256

    72c652ce2b95a0d10d25b23343bf09e4324086b314118e25ba88ac6f719e3f2f

  • SHA512

    a0326a44edce7d63d4a7d9d42959d443be740be8c9de7f346d574ba73f3a69ff06890e3b0a37c8e9f098a5d19e7b8059c27e64f8e23e72bfcde8a2e88000a311

  • SSDEEP

    768:a7iUb3hzF0v9mi7pw3iwZW9AUJCNw7h8IKFKGI:aFb3hziU3iwZW9hC+7yFK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\72c652ce2b95a0d10d25b23343bf09e4324086b314118e25ba88ac6f719e3f2f.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1592

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1592-54-0x00000000726C1000-0x00000000726C4000-memory.dmp
    Filesize

    12KB

  • memory/1592-55-0x0000000070141000-0x0000000070143000-memory.dmp
    Filesize

    8KB

  • memory/1592-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1592-57-0x000000007112D000-0x0000000071138000-memory.dmp
    Filesize

    44KB

  • memory/1592-58-0x0000000074FB1000-0x0000000074FB3000-memory.dmp
    Filesize

    8KB

  • memory/1592-59-0x000000007112D000-0x0000000071138000-memory.dmp
    Filesize

    44KB