Analysis

  • max time kernel
    163s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 15:12

General

  • Target

    bae7ee765f1ec70ca4a9a734abecca822860c67ed6b42f8bab49ab2b34808eac.docm

  • Size

    21KB

  • MD5

    0a09b1ddda6cf6c1d2e52566986cc379

  • SHA1

    2c779063e1393af486c0e81431bbb4e682afd586

  • SHA256

    bae7ee765f1ec70ca4a9a734abecca822860c67ed6b42f8bab49ab2b34808eac

  • SHA512

    35ad11c57050d707d5d46ee6dbd119f9c44993b0c014c9efc5f85bc69fc5251e7d4585cb5acac434e1cdf63b99f57dcbc00c43b671c2b68a41b987ccee36b606

  • SSDEEP

    384:CTeEJwk57y4uCo4wB2Z1xG7tlBcxXw6besz2h:3Ohy7UZbKlBcxA6beszG

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bae7ee765f1ec70ca4a9a734abecca822860c67ed6b42f8bab49ab2b34808eac.docm"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2656-0-0x000000002F611000-0x000000002F612000-memory.dmp

    Filesize

    4KB

  • memory/2656-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2656-2-0x000000007186D000-0x0000000071878000-memory.dmp

    Filesize

    44KB

  • memory/2656-5-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2656-6-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2656-7-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2656-8-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2656-9-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2656-10-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2656-12-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2656-11-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2656-13-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2656-14-0x000000007186D000-0x0000000071878000-memory.dmp

    Filesize

    44KB

  • memory/2656-15-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2656-16-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB