Analysis

  • max time kernel
    6s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    21-10-2020 09:32

General

  • Target

    sample20201021-01.xlsm

  • Size

    43KB

  • MD5

    0ec3a0613d2fc39417eaccebaedfcdf0

  • SHA1

    0195cdd1579f6be5f143e36c942075ae811c0595

  • SHA256

    857b5c1209e2bec7dda0c80b92123f4ceb15f8c560f23551804e4bd09b94e901

  • SHA512

    2f77e01859e5a54f7002b3ea13a17167589e4aa2b48b71a17d9d86f515af81b95acbbbfadcbd94818eb9a9ece47d2b7205dff8253329d9165ad9914b6f2af3f3

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\sample20201021-01.xlsm
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1424-0-0x00000000067B0000-0x00000000069B0000-memory.dmp
    Filesize

    2.0MB

  • memory/1424-1-0x00000000067B0000-0x00000000069B0000-memory.dmp
    Filesize

    2.0MB

  • memory/1424-2-0x0000000006C9E000-0x0000000006CAF000-memory.dmp
    Filesize

    68KB

  • memory/1424-3-0x00000000067B0000-0x00000000069B0000-memory.dmp
    Filesize

    2.0MB

  • memory/1424-4-0x0000000006C9E000-0x0000000006CAF000-memory.dmp
    Filesize

    68KB