Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25-07-2023 09:53
Static task
static1
Behavioral task
behavioral1
Sample
Overview_of_UWCs_UkraineInNATO_campaign.docx
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Overview_of_UWCs_UkraineInNATO_campaign.docx
Resource
win10v2004-20230703-en
General
-
Target
Overview_of_UWCs_UkraineInNATO_campaign.docx
-
Size
117KB
-
MD5
d227874863036b8e73a3894a19bd25a0
-
SHA1
2400b169ee2c38ac146c67408debc9b4fa4fca5f
-
SHA256
a61b2eafcf39715031357df6b01e85e0d1ea2e8ee1dfec241b114e18f7a1163f
-
SHA512
5304a8f4fce0718df717e67b0c91b3aef670f8fa226ee49dc23b72bb677301d310016626433ee8336f393f2afc92609f6c69c99862055c71316bef3f762714ed
-
SSDEEP
3072:l7+cULFyt0l7P8trDG5CL1WvRC5pugMExFAiWRXlV:lPrtWuK5C8vE5puiFAimlV
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2324 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2324 WINWORD.EXE 2324 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 2324 wrote to memory of 2484 2324 WINWORD.EXE splwow64.exe PID 2324 wrote to memory of 2484 2324 WINWORD.EXE splwow64.exe PID 2324 wrote to memory of 2484 2324 WINWORD.EXE splwow64.exe PID 2324 wrote to memory of 2484 2324 WINWORD.EXE splwow64.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Overview_of_UWCs_UkraineInNATO_campaign.docx"1⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2484
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5d21fe809da9514c68e209feb1ace28a2
SHA1dbdf7b9437eb04dc6a649ed10f21aa83a0cd3ed5
SHA2566c579aca7a393fb6edece62324947d7378aeb40ccf0f7eeb513f6d289cb2c9de
SHA51272748bc11ac96d91309e4620f905873ed5290e13afa8678a6a942df4f9a8c9f5d0b8a698c3676c90e1eaa62e7b23e498ba6b29fe49f18500a23a1672fe9b6bd4