Analysis
-
max time kernel
103s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2023 12:58
Static task
static1
Behavioral task
behavioral1
Sample
Overview_of_UWCs_UkraineInNATO_campaign.docx
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
Overview_of_UWCs_UkraineInNATO_campaign.docx
Resource
win10v2004-20230703-en
General
-
Target
Overview_of_UWCs_UkraineInNATO_campaign.docx
-
Size
117KB
-
MD5
d227874863036b8e73a3894a19bd25a0
-
SHA1
2400b169ee2c38ac146c67408debc9b4fa4fca5f
-
SHA256
a61b2eafcf39715031357df6b01e85e0d1ea2e8ee1dfec241b114e18f7a1163f
-
SHA512
5304a8f4fce0718df717e67b0c91b3aef670f8fa226ee49dc23b72bb677301d310016626433ee8336f393f2afc92609f6c69c99862055c71316bef3f762714ed
-
SSDEEP
3072:l7+cULFyt0l7P8trDG5CL1WvRC5pugMExFAiWRXlV:lPrtWuK5C8vE5puiFAimlV
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2988 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2988 WINWORD.EXE 2988 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 2988 wrote to memory of 1756 2988 WINWORD.EXE splwow64.exe PID 2988 wrote to memory of 1756 2988 WINWORD.EXE splwow64.exe PID 2988 wrote to memory of 1756 2988 WINWORD.EXE splwow64.exe PID 2988 wrote to memory of 1756 2988 WINWORD.EXE splwow64.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Overview_of_UWCs_UkraineInNATO_campaign.docx"1⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1756
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD51e7562d6657449b410a9218b8d760aad
SHA18f77ade5d59c695a7e685fd0ee00637ca2ca9eaf
SHA256606a156278d3ca82b80130d537dac83b0a3261e765f92c0d244eb6bb6410193f
SHA5122450aacc5bbf8371b771e801c1afcfbddece5399fc8252cea2714766fac128f538fdb9beacb7e640feefe00dd14e6a1c6a13b5f1d565f02ed66097be902af60c