Resubmissions

04-03-2021 08:55

210304-3v5936jhma 8

04-03-2021 00:41

210304-nc5mmhc9nn 8

Analysis

  • max time kernel
    141s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-03-2021 00:41

General

  • Target

    SecuriteInfo.com.Trojan.GenericKDZ.73289.7113.18453.xlsm

  • Size

    156KB

  • MD5

    7f42a6d0bfe2e9314d4284ab04000d2a

  • SHA1

    2d4e0833c12c3013ba24c3d281cf7e70db579e64

  • SHA256

    f4484f1fc147e4d0a5cc6c64d223e44b2f3686761b4da9cb5490d2420fe8a608

  • SHA512

    9144a0b72ce702ecd08aca427f8a4c1b500fb4f1336db986a95eead5d23e2656ea515fd86b7c7bff445446a8952a7dd4cc5f1eb53b898b197fccb9e5a45c15c1

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKDZ.73289.7113.18453.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/616-2-0x00007FFE498B0000-0x00007FFE498C0000-memory.dmp

    Filesize

    64KB

  • memory/616-3-0x00007FFE498B0000-0x00007FFE498C0000-memory.dmp

    Filesize

    64KB

  • memory/616-4-0x00007FFE498B0000-0x00007FFE498C0000-memory.dmp

    Filesize

    64KB

  • memory/616-5-0x00007FFE498B0000-0x00007FFE498C0000-memory.dmp

    Filesize

    64KB

  • memory/616-6-0x00007FFE6CB10000-0x00007FFE6D147000-memory.dmp

    Filesize

    6.2MB