Analysis

  • max time kernel
    145s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/02/2023, 00:37

General

  • Target

    8a2504773458c8653ee37ab12ee09714c17268403e3a5511218db3536c7c2fd5.docm

  • Size

    17KB

  • MD5

    f441310fe21a50a66b9f0f110909b614

  • SHA1

    fc6dc93fea11a948959db6b9ecb3fe35af394e4d

  • SHA256

    8a2504773458c8653ee37ab12ee09714c17268403e3a5511218db3536c7c2fd5

  • SHA512

    9a9ab402205de7d635f8b02972756a23da09c377e4a4870310a62096910a03ab24b94e5c7feb76bf8d0ad199a09c7ffe28eef1e942aef83acbb95a81ff44355d

  • SSDEEP

    384:/iratn+n3d7YexmLhMBqNcNxt/ZtNNLdgrFsb6Hj8gn11UtUy/:/2gg3djxmLaBqYxllNLdgRsbDgn11UL/

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8a2504773458c8653ee37ab12ee09714c17268403e3a5511218db3536c7c2fd5.docm"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2000

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2000-54-0x0000000072511000-0x0000000072514000-memory.dmp

          Filesize

          12KB

        • memory/2000-55-0x000000006FF91000-0x000000006FF93000-memory.dmp

          Filesize

          8KB

        • memory/2000-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2000-57-0x0000000075D11000-0x0000000075D13000-memory.dmp

          Filesize

          8KB

        • memory/2000-58-0x0000000070F7D000-0x0000000070F88000-memory.dmp

          Filesize

          44KB

        • memory/2000-59-0x00000000006C5000-0x00000000006C9000-memory.dmp

          Filesize

          16KB

        • memory/2000-60-0x00000000006C5000-0x00000000006C9000-memory.dmp

          Filesize

          16KB