Analysis

  • max time kernel
    178s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 19:34

General

  • Target

    da5fea3efb1c32b9f1b68fe3d34835db.doc

  • Size

    12KB

  • MD5

    da5fea3efb1c32b9f1b68fe3d34835db

  • SHA1

    002a3a7d1d1837d0064ddd3d3e4d27b90cd18123

  • SHA256

    f337146d4229155afc774f59ce4b6439fcf1d4d02ab00f3ffb20b71b3ce32af6

  • SHA512

    7e485ed5aaf49ef0fff4a7836058183f5727d48de1f8c11c11116eef818d8594e35028737df3c158bd724b24332c60dbee22a763e098c80a1677c358e501ec71

  • SSDEEP

    96:R+7Uk18pxee+mIET6FoHa4Ehb1vC+X4FXfWT4JlT3wYlEAgCT16c25gIMKyyli:gSxeeOETbHefNaXfvJlZlEDg16tgdKd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\da5fea3efb1c32b9f1b68fe3d34835db.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1716

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1716-54-0x00000000722A1000-0x00000000722A4000-memory.dmp

          Filesize

          12KB

        • memory/1716-55-0x000000006FD21000-0x000000006FD23000-memory.dmp

          Filesize

          8KB

        • memory/1716-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1716-57-0x00000000760C1000-0x00000000760C3000-memory.dmp

          Filesize

          8KB

        • memory/1716-58-0x0000000070D0D000-0x0000000070D18000-memory.dmp

          Filesize

          44KB