Analysis

  • max time kernel
    183s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 21:47

General

  • Target

    42c0f0a54aecc07a1e1108369839767359f0aa5cc1df96396e97283f9eac6f8f.dotm

  • Size

    59KB

  • MD5

    42b24fbca3c90ea8d9eeebac0206f395

  • SHA1

    5e5ba921bf4c358aa2468e5773656783995de1e4

  • SHA256

    42c0f0a54aecc07a1e1108369839767359f0aa5cc1df96396e97283f9eac6f8f

  • SHA512

    1f948adb8b9152f853b7b2dcff76c70ac159c9592440ad581a9089ead43a55ce76ef3431c8f9ca95e569b0153ba204e941d045e479d2db53121173b3e95127be

  • SSDEEP

    768:uipU1vFBXRw0FmK9L7v9fkKsfQf1ze9URmFHj+O5y5ArT4uzgsLD/pxoAHAuQ8A:uiWFrhjZH9cY9ze9GmFD95nE9sLtGgK

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\42c0f0a54aecc07a1e1108369839767359f0aa5cc1df96396e97283f9eac6f8f.dotm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1956

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1320-54-0x0000000073011000-0x0000000073014000-memory.dmp
      Filesize

      12KB

    • memory/1320-55-0x0000000070A91000-0x0000000070A93000-memory.dmp
      Filesize

      8KB

    • memory/1320-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1320-57-0x0000000071A7D000-0x0000000071A88000-memory.dmp
      Filesize

      44KB

    • memory/1320-58-0x00000000761E1000-0x00000000761E3000-memory.dmp
      Filesize

      8KB

    • memory/1320-59-0x0000000071A7D000-0x0000000071A88000-memory.dmp
      Filesize

      44KB

    • memory/1320-60-0x000000000027A000-0x0000000000280000-memory.dmp
      Filesize

      24KB

    • memory/1320-61-0x000000000027A000-0x0000000000280000-memory.dmp
      Filesize

      24KB

    • memory/1320-62-0x0000000005E30000-0x0000000006A7A000-memory.dmp
      Filesize

      12.3MB

    • memory/1320-63-0x0000000005E30000-0x0000000006A7A000-memory.dmp
      Filesize

      12.3MB

    • memory/1956-64-0x0000000000000000-mapping.dmp
    • memory/1956-65-0x000007FEFC471000-0x000007FEFC473000-memory.dmp
      Filesize

      8KB