Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 22:51

General

  • Target

    1f0284f54fe0a42692373246b30fe0b5.doc

  • Size

    950KB

  • MD5

    1f0284f54fe0a42692373246b30fe0b5

  • SHA1

    9b6b553fdd1df8a20ff97c5fb010b297050d2d00

  • SHA256

    ba37749d25d949955d57888559e1e69bc1fa83ab38422b3e9e3fa70b52e567e1

  • SHA512

    cdde4fc38bf713cbb1fa0398c33a86d107c64b8d28148d86aff5248448b64c18df3ecd02ba67d2748bb6a1d481324f7fa9b33086dbc2e111bf9b92f2fd476bfc

  • SSDEEP

    24576:JEIZ4wA74D4SQKxZcy8gthDWjC4byh3/auWpkE0Wu:J+wJD4QZh/qeGy1aRSE0Wu

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1f0284f54fe0a42692373246b30fe0b5.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D42ECE06.emf

      Filesize

      4KB

      MD5

      0b7c6928219eda05ea042c41d551679d

      SHA1

      5507fe49a9d82726fe5ce4206d71c19ad65f0eff

      SHA256

      04b3cbf2b5c0a5c1e93aab8719739c31d586d37ea1ff8ed2ac49aa99226005d3

      SHA512

      61914450c8c12fdbad7b381fe23673b6ce5e5f5a141f2ecb36af52cf45edf2e1a7e077742c0e32198aee6d9a3bc07f2c9a6ab5b062d897332267e8a176ce9fc0

    • memory/2108-16-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-7-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-24-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-21-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-8-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-10-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-12-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-15-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-0-0x000000002F061000-0x000000002F062000-memory.dmp

      Filesize

      4KB

    • memory/2108-17-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-18-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-19-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-14-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-23-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-26-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-25-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-6-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-22-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-2-0x0000000070D8D000-0x0000000070D98000-memory.dmp

      Filesize

      44KB

    • memory/2108-20-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-13-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-11-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-9-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-31-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-38-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-44-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2108-40-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-39-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-37-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-36-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-34-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-33-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-53-0x0000000070D8D000-0x0000000070D98000-memory.dmp

      Filesize

      44KB

    • memory/2108-54-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/2108-55-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB