Analysis

  • max time kernel
    44s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    21-10-2020 09:45

General

  • Target

    Inv_64103_from_899482.xlsm

  • Size

    43KB

  • MD5

    0ec3a0613d2fc39417eaccebaedfcdf0

  • SHA1

    0195cdd1579f6be5f143e36c942075ae811c0595

  • SHA256

    857b5c1209e2bec7dda0c80b92123f4ceb15f8c560f23551804e4bd09b94e901

  • SHA512

    2f77e01859e5a54f7002b3ea13a17167589e4aa2b48b71a17d9d86f515af81b95acbbbfadcbd94818eb9a9ece47d2b7205dff8253329d9165ad9914b6f2af3f3

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Inv_64103_from_899482.xlsm
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:336

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/336-0-0x0000000006580000-0x0000000006780000-memory.dmp
    Filesize

    2.0MB

  • memory/336-1-0x0000000006580000-0x0000000006780000-memory.dmp
    Filesize

    2.0MB

  • memory/336-2-0x0000000006580000-0x0000000006780000-memory.dmp
    Filesize

    2.0MB

  • memory/336-3-0x0000000006975000-0x0000000006986000-memory.dmp
    Filesize

    68KB