Analysis

  • max time kernel
    117s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2023 08:44

General

  • Target

    Q.doc

  • Size

    160B

  • MD5

    abaf29678fcbcd3ed3ce52515d57d006

  • SHA1

    41f5f851e88843bfd3b87ed903bcd85950631596

  • SHA256

    ca2b5296fccde1a2a10f02c8d8e62fac3ed7929720f1c3e920964a1f416c8740

  • SHA512

    21ba294ac7030ddcc273891fd15c2d994ecbb8e1939a000ae3915928f55e6f6e834d56e83e07de09c72caaf1d037b45ecc2a4d4156992b2e1e773f9e0d9f3289

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Q.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      5f3f8bbd44aa5beee4419db19de72517

      SHA1

      af00cca623697ebabd1b2f1d7c822afd792ffa6c

      SHA256

      c88b97235bee78ac214ec8ecf7170c0bd8b224b1f8f3f407cfc76e9befe10636

      SHA512

      1c1c0042edecf686445ff2476e43a7c1dc8fc6dc4d58b2ceec40215c7205ca6dccbf626d8c08c034b9a575f54a93a4f607e3814f7a0ba8e3e7172953d1d2f496

    • memory/1944-0-0x000000002FAD1000-0x000000002FAD2000-memory.dmp

      Filesize

      4KB

    • memory/1944-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1944-2-0x0000000070C1D000-0x0000000070C28000-memory.dmp

      Filesize

      44KB

    • memory/1944-10-0x0000000070C1D000-0x0000000070C28000-memory.dmp

      Filesize

      44KB

    • memory/1944-26-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1944-27-0x0000000070C1D000-0x0000000070C28000-memory.dmp

      Filesize

      44KB