Analysis

  • max time kernel
    70s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    29-10-2020 04:37

General

  • Target

    doc_pack-2037547827.xlsb

  • Size

    24KB

  • MD5

    a0fbb59bc74ecc5a56776e87d9fb1793

  • SHA1

    41ce559783bf400e2fa1b0a613e7afbafa3eec45

  • SHA256

    e6169b9ed979696b382737b0f3aa11e25a273ec8bd68753e3675ad89d9a0ae6a

  • SHA512

    1cb61a5ab46077dc0a2de5d398e9b15837dd592ff5b12f6bea5953f3f84a703d21076338212e69f08b0cef0350605cec3167c99536a3206e38a0ad176711ad44

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\doc_pack-2037547827.xlsb
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/748-5-0x000007FEF7FE0000-0x000007FEF825A000-memory.dmp

    Filesize

    2.5MB

  • memory/1320-0-0x0000000002050000-0x0000000002051000-memory.dmp

    Filesize

    4KB

  • memory/1320-2-0x0000000002050000-0x0000000002051000-memory.dmp

    Filesize

    4KB

  • memory/1320-4-0x0000000002050000-0x0000000002051000-memory.dmp

    Filesize

    4KB