Analysis
-
max time kernel
27s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 01:47
Behavioral task
behavioral1
Sample
a0895398621653c885d134f1ad1332becf0158d89dbbf014e0a3baea1991129a.doc
Resource
win7-20240221-en
5 signatures
40 seconds
Behavioral task
behavioral2
Sample
a0895398621653c885d134f1ad1332becf0158d89dbbf014e0a3baea1991129a.doc
Resource
win10v2004-20240412-en
4 signatures
40 seconds
General
-
Target
a0895398621653c885d134f1ad1332becf0158d89dbbf014e0a3baea1991129a.doc
-
Size
40KB
-
MD5
683ca9c5319ce504258c587cecf7b668
-
SHA1
3c9c62fbc56989e1cba5190c80921f4df229df0a
-
SHA256
a0895398621653c885d134f1ad1332becf0158d89dbbf014e0a3baea1991129a
-
SHA512
8c72775d2b9b0807b4b2517128cd27110113783cd0e11969d12176a863ea61662fb01d498caff271d9bea78666a83d19e1c5c9a8297aaf21e60175a9cd8b7d7e
-
SSDEEP
384:OE8iSwvxjk+tQrrqrZeJ17z2tGzH5g0jNktV/W:Oqxw+twsAJ17PzuWr
Score
1/10
Malware Config
Signatures
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2804 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 WINWORD.EXE 2804 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2816 2804 WINWORD.EXE 28 PID 2804 wrote to memory of 2816 2804 WINWORD.EXE 28 PID 2804 wrote to memory of 2816 2804 WINWORD.EXE 28 PID 2804 wrote to memory of 2816 2804 WINWORD.EXE 28
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a0895398621653c885d134f1ad1332becf0158d89dbbf014e0a3baea1991129a.doc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2816
-