Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2023, 20:38

General

  • Target

    50a9415dd0ae18db1b7106d6aad9c8c5470672eb29c2214dbb0c2b39ade52a00.doc

  • Size

    10.4MB

  • MD5

    35eaad637735cab7cb04cff066196e1a

  • SHA1

    3f1aa07c690c59cef812a34368d16f766fd1a819

  • SHA256

    50a9415dd0ae18db1b7106d6aad9c8c5470672eb29c2214dbb0c2b39ade52a00

  • SHA512

    0a1517ae5bfd6defff078887f265e64227cfae44ccf606b1e6d2e7f67194e306046586400521af43886451cf506ea763a5b3a6bd8bd70442f4f00842e7811bfe

  • SSDEEP

    24576:NQUAXXMxYV9BO65rN4VZBAmDT79vfHwVnZ8Z93SLTTlugJUA2DTt/ODp1oHVBI9R:NQ1Qvvz3WEQbKcKwz8k

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\50a9415dd0ae18db1b7106d6aad9c8c5470672eb29c2214dbb0c2b39ade52a00.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:696

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            b61f9b8ce2e2b5bfe33f6da814a0bb2b

            SHA1

            2d20c0466166c96fa2460f14ae6b4b6cbbe0ac7e

            SHA256

            fe303f4a35925ecb7760628b049e51b158b4529033724d5d787f0369e0c5257f

            SHA512

            6d0ff3c844dea12bd9f5840441176a203458520d36458005190af48d18cc765d2324e8b72cec96c060c1ed3a962337e91a7b19643f12ce6ec660bc0bfb73062e

          • memory/932-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/932-83-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB