Analysis

  • max time kernel
    59s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 07:37

General

  • Target

    1eeb63beb49968b32d0b451613059ef29957b922cf7c5cd170c4257eed7ff5a5.doc

  • Size

    38KB

  • MD5

    e353fed1111bf8f52bcfdf1bf3400952

  • SHA1

    39878ea251e2e4ab33a8f94f36a664940d7debd4

  • SHA256

    1eeb63beb49968b32d0b451613059ef29957b922cf7c5cd170c4257eed7ff5a5

  • SHA512

    e295a6f2339bc6eb79ee7645bed658669df5440b68805bbe2cffd6333b16ffa5890b1b6c463fd269fb70fb8194f9c9163a4a672d18f92f666debf81c98a5b6f6

  • SSDEEP

    384:W2IiSgq03gBapIkZ+Rmg+40oqI8CkxQaH50jTcw8Uxt:/G03gmZs0oqI8PxQaZjI

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1eeb63beb49968b32d0b451613059ef29957b922cf7c5cd170c4257eed7ff5a5.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2520

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1028-0-0x000000002F041000-0x000000002F042000-memory.dmp

            Filesize

            4KB

          • memory/1028-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1028-2-0x00000000714FD000-0x0000000071508000-memory.dmp

            Filesize

            44KB

          • memory/1028-12-0x0000000000760000-0x0000000000860000-memory.dmp

            Filesize

            1024KB

          • memory/1028-19-0x0000000000760000-0x0000000000860000-memory.dmp

            Filesize

            1024KB

          • memory/1028-25-0x00000000714FD000-0x0000000071508000-memory.dmp

            Filesize

            44KB

          • memory/1028-26-0x0000000000760000-0x0000000000860000-memory.dmp

            Filesize

            1024KB