Analysis

  • max time kernel
    79s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2023 09:11

General

  • Target

    chMBc30l.docx

  • Size

    10KB

  • MD5

    5089711b3c7bf928ca2cf6cc09573c62

  • SHA1

    66aef8430a0341281d152242f54f98866f176b8f

  • SHA256

    2e9e0387c4552a6ac49745813e3d91aaed380f5fcba4910fa713146aab55e77a

  • SHA512

    7e5678bb67cf5a8f614e885caa735a597fc97de251067fe7a495b32d87f10cf79c759b647d8ac7a318c580c9ffe7d0e27390b6bf9c1dc0d5d93aa6d66555f427

  • SSDEEP

    192:ScIMmtP8ar5G/bfIdTOx3namWBX8ex6y3FvR:SPXt4ATOFnosMFp

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\chMBc30l.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1360

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1360-54-0x0000000072B01000-0x0000000072B04000-memory.dmp
    Filesize

    12KB

  • memory/1360-55-0x0000000070581000-0x0000000070583000-memory.dmp
    Filesize

    8KB

  • memory/1360-56-0x0000000076771000-0x0000000076773000-memory.dmp
    Filesize

    8KB

  • memory/1360-57-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1360-58-0x000000007156D000-0x0000000071578000-memory.dmp
    Filesize

    44KB

  • memory/1360-59-0x000000007156D000-0x0000000071578000-memory.dmp
    Filesize

    44KB