Analysis

  • max time kernel
    152s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    29-10-2020 04:37

General

  • Target

    doc_pack-2068150358.xlsb

  • Size

    24KB

  • MD5

    6b9c26956fe7530b4ccb4d347882a28b

  • SHA1

    41d51e1c641bc523a3385967e8dffaaf2de20f94

  • SHA256

    a2b76ea96c50e372dbef1e65cc6643ce2bb57196685edb744746770e0e2709eb

  • SHA512

    c8829d8c8ba4b8971f91df8407d092329112d68540b842880c2dc8f47c9288d854df534d1b07db420a14fb97fc632987a7a18b5ea317c0c8e347a370df38e8f9

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\doc_pack-2068150358.xlsb
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1740-5-0x000007FEF6010000-0x000007FEF628A000-memory.dmp

    Filesize

    2.5MB

  • memory/1980-0-0x0000000001D60000-0x0000000001D61000-memory.dmp

    Filesize

    4KB

  • memory/1980-2-0x0000000001D60000-0x0000000001D61000-memory.dmp

    Filesize

    4KB

  • memory/1980-4-0x0000000001D60000-0x0000000001D61000-memory.dmp

    Filesize

    4KB