Analysis

  • max time kernel
    151s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    17-07-2020 16:14

General

  • Target

    reminder_1687164.xls

  • Size

    367KB

  • MD5

    6b1a1c7461aaf71e3857232a4412e4fc

  • SHA1

    51c02cffabb7d7bf7fbc99b2d6d15a91a1eea1dd

  • SHA256

    19a1f6546cece68543aac388416cdf867ef8aee9061a6ed902d45ce49715a69c

  • SHA512

    caf685429d4d4744abdc4acfab5d9bb6072326087079ae2da227e637a86fb02f537495826740263b3bf21ecf436625e400f66c91eec30c43dec02826d0a06618

Score
10/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\reminder_1687164.xls
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:\oteXeJW\VlorjJX\xRLBgpq.dll,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:1084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads