Analysis

  • max time kernel
    124s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    06-05-2021 14:01

General

  • Target

    1613044558-05062021.xlsm

  • Size

    110KB

  • MD5

    e43036ff5733aebc5c2f46081c7f9006

  • SHA1

    e30d56021f158178fbaf7c9d45aa658b924a67e5

  • SHA256

    7b4801469217b291d85882cf568da70ceb8aec9d82ba3879794fa4bcf99ef25f

  • SHA512

    f6c4197586371e0fe8051f51a31b80ac9ae199e32dbf14f213276f3513c6b3cc801a046ac400c6e4c107ba4776ea9dd565594334a42c65d1d88a28a5fb8181ff

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1613044558-05062021.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/620-114-0x00007FF7E8410000-0x00007FF7EB9C6000-memory.dmp
    Filesize

    53.7MB

  • memory/620-115-0x00007FFF50D30000-0x00007FFF50D40000-memory.dmp
    Filesize

    64KB

  • memory/620-116-0x00007FFF50D30000-0x00007FFF50D40000-memory.dmp
    Filesize

    64KB

  • memory/620-117-0x00007FFF50D30000-0x00007FFF50D40000-memory.dmp
    Filesize

    64KB

  • memory/620-118-0x00007FFF50D30000-0x00007FFF50D40000-memory.dmp
    Filesize

    64KB

  • memory/620-119-0x00007FFF50D30000-0x00007FFF50D40000-memory.dmp
    Filesize

    64KB

  • memory/620-122-0x00007FFF71AE0000-0x00007FFF72BCE000-memory.dmp
    Filesize

    16.9MB

  • memory/620-123-0x00007FFF6FBE0000-0x00007FFF71AD5000-memory.dmp
    Filesize

    31.0MB