Analysis

  • max time kernel
    27s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2024, 01:47

General

  • Target

    a0895398621653c885d134f1ad1332becf0158d89dbbf014e0a3baea1991129a.doc

  • Size

    40KB

  • MD5

    683ca9c5319ce504258c587cecf7b668

  • SHA1

    3c9c62fbc56989e1cba5190c80921f4df229df0a

  • SHA256

    a0895398621653c885d134f1ad1332becf0158d89dbbf014e0a3baea1991129a

  • SHA512

    8c72775d2b9b0807b4b2517128cd27110113783cd0e11969d12176a863ea61662fb01d498caff271d9bea78666a83d19e1c5c9a8297aaf21e60175a9cd8b7d7e

  • SSDEEP

    384:OE8iSwvxjk+tQrrqrZeJ17z2tGzH5g0jNktV/W:Oqxw+twsAJ17PzuWr

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a0895398621653c885d134f1ad1332becf0158d89dbbf014e0a3baea1991129a.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2804-0-0x000000002F6F1000-0x000000002F6F2000-memory.dmp

      Filesize

      4KB

    • memory/2804-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2804-2-0x0000000070E5D000-0x0000000070E68000-memory.dmp

      Filesize

      44KB

    • memory/2804-18-0x00000000049F0000-0x0000000004AF0000-memory.dmp

      Filesize

      1024KB

    • memory/2804-22-0x00000000049F0000-0x0000000004AF0000-memory.dmp

      Filesize

      1024KB

    • memory/2804-29-0x00000000049F0000-0x0000000004AF0000-memory.dmp

      Filesize

      1024KB

    • memory/2804-34-0x0000000070E5D000-0x0000000070E68000-memory.dmp

      Filesize

      44KB

    • memory/2804-35-0x00000000049F0000-0x0000000004AF0000-memory.dmp

      Filesize

      1024KB