Analysis

  • max time kernel
    148s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 16:46

General

  • Target

    b594a21a09140b47417d9e4b4e0f29b95becdeaad535ccaa9f8d5cb5a793e9b6.doc

  • Size

    81KB

  • MD5

    03b3e2f0e14aa48c124e9814ca3038d7

  • SHA1

    744ce7e3c144012c54406dc058c36aa3c2fad23c

  • SHA256

    b594a21a09140b47417d9e4b4e0f29b95becdeaad535ccaa9f8d5cb5a793e9b6

  • SHA512

    79766cbe29eb57bad145e2e5a50adb926fe34364969dadf57e8159409266aa17795857899d6d7a814fddfb8ef9a0024218372eb7af64945551242604db8619d9

  • SSDEEP

    768:NkHAbBe6w627lmkm8jD8/XUeQflfzVMi/3dhj:NkHA1e6bT/OraI

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b594a21a09140b47417d9e4b4e0f29b95becdeaad535ccaa9f8d5cb5a793e9b6.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1972

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1832-62-0x0000000000495000-0x0000000000499000-memory.dmp
      Filesize

      16KB

    • memory/1832-58-0x0000000075601000-0x0000000075603000-memory.dmp
      Filesize

      8KB

    • memory/1832-54-0x0000000072191000-0x0000000072194000-memory.dmp
      Filesize

      12KB

    • memory/1832-57-0x0000000070BFD000-0x0000000070C08000-memory.dmp
      Filesize

      44KB

    • memory/1832-65-0x0000000000495000-0x0000000000499000-memory.dmp
      Filesize

      16KB

    • memory/1832-59-0x0000000000495000-0x0000000000499000-memory.dmp
      Filesize

      16KB

    • memory/1832-60-0x0000000000495000-0x0000000000499000-memory.dmp
      Filesize

      16KB

    • memory/1832-68-0x0000000000495000-0x0000000000499000-memory.dmp
      Filesize

      16KB

    • memory/1832-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1832-55-0x000000006FC11000-0x000000006FC13000-memory.dmp
      Filesize

      8KB

    • memory/1832-61-0x0000000000495000-0x0000000000499000-memory.dmp
      Filesize

      16KB

    • memory/1832-71-0x0000000000495000-0x0000000000499000-memory.dmp
      Filesize

      16KB

    • memory/1832-72-0x0000000070BFD000-0x0000000070C08000-memory.dmp
      Filesize

      44KB

    • memory/1832-76-0x0000000070BFD000-0x0000000070C08000-memory.dmp
      Filesize

      44KB

    • memory/1832-75-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1972-74-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp
      Filesize

      8KB

    • memory/1972-73-0x0000000000000000-mapping.dmp