Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 19:49

General

  • Target

    0c7b92a5fd52358a47f4382f8c90e270c5c089ad06aa7cfb07c0a00716a22c15.doc

  • Size

    601KB

  • MD5

    67b338452c46bed8dc42f92a41769b42

  • SHA1

    dbed52ba7491dde2d8c9c78b3646813bed2fa6d4

  • SHA256

    0c7b92a5fd52358a47f4382f8c90e270c5c089ad06aa7cfb07c0a00716a22c15

  • SHA512

    51fab1f96da755c866d7358c96d0fe531b38c376a0538846f843d506a48fffafd7c2f338d7c2d91b7459a2b0a3edaf638a69ce2d17174abc25d666531e4043d1

  • SSDEEP

    12288:GrB9PFh0nxClNo0vBDrQiA1dA1u3KJbUh9Plj1S1HQ/hEV0/lye:GBd/6x10pDr3A1dA1u3KJbUh9Plj1S1S

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0c7b92a5fd52358a47f4382f8c90e270c5c089ad06aa7cfb07c0a00716a22c15.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1932-0-0x000000002FF51000-0x000000002FF52000-memory.dmp

    Filesize

    4KB

  • memory/1932-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1932-2-0x0000000070D1D000-0x0000000070D28000-memory.dmp

    Filesize

    44KB

  • memory/1932-5-0x0000000070D1D000-0x0000000070D28000-memory.dmp

    Filesize

    44KB