Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    29-10-2020 03:39

General

  • Target

    doc_pack-1935863934.xlsb

  • Size

    24KB

  • MD5

    d8b0cb9883d7b638961c75104280ffbe

  • SHA1

    6efebca2dc46e844a1bf61113cde8568b5b94d86

  • SHA256

    4220f7a3c375caa90e013a7d359635eef0a9eb1c69c50d94703adc1dd6febc77

  • SHA512

    6daee8372444ae429a9e1529e7a281739e5a75d3adc1a706ed9b17d41bff02b57b621c300f489d0a400e5d2f4f64cb4f709cf386ba1dae83cd3e91e38c3d7919

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\doc_pack-1935863934.xlsb
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1808-5-0x000007FEF7810000-0x000007FEF7A8A000-memory.dmp

    Filesize

    2.5MB

  • memory/1880-0-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB

  • memory/1880-2-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB

  • memory/1880-4-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB