Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-07-2024 05:53

General

  • Target

    Nicaean/Gangbrdderne86.doc

  • Size

    301KB

  • MD5

    f2060b3940c55ff4023d4340598f4aa9

  • SHA1

    a7ee53054c21ab1b6082db2732e1973a98ac5149

  • SHA256

    6178d1b0de66ef523b5ce188bb92eb9651ff99383a0ed1e1b9b2cd69f651c45e

  • SHA512

    9b212142cde23a426b51d151547a73b9a5ba04081c354d8f0c5b8cbce9ec359db53aa2a4677a59532b83d06baa65127391b82816ef02a70b8a1f8e4f2aa84462

  • SSDEEP

    384:m6srPhzGmc17ehfBtdbowZFBhBLnHIaQjcNWmBsuJYMxsZlRfaWC6uLg1x0S68Jz:OPhOWhtZIXEvJYjRfa+

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Nicaean\Gangbrdderne86.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1460

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1460-0-0x000000002FA61000-0x000000002FA62000-memory.dmp
    Filesize

    4KB

  • memory/1460-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1460-2-0x000000007176D000-0x0000000071778000-memory.dmp
    Filesize

    44KB

  • memory/1460-5-0x000000007176D000-0x0000000071778000-memory.dmp
    Filesize

    44KB