Analysis

  • max time kernel
    70s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    07-05-2021 15:11

General

  • Target

    order 387105.xlsm

  • Size

    85KB

  • MD5

    909906cd30a05b778f519a53b1b85a7b

  • SHA1

    ee03341352bebb9456f6c1c32ae2330703c674d6

  • SHA256

    7e8ac58c494d14dfeddcd46f67061c7a5a6277b95ab17ce4cf55ac839fd149d4

  • SHA512

    1fbc31f2693959342445243beec3dc09522d6a1b4abc8229bdfec64964bc66bd2c4d58f236564eb61dbbbd8c365b8e464ff5c585e5148ede2a144fb1d7f2d07e

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\order 387105.xlsm"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2040

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2040-60-0x000000002FD01000-0x000000002FD04000-memory.dmp
    Filesize

    12KB

  • memory/2040-61-0x0000000071941000-0x0000000071943000-memory.dmp
    Filesize

    8KB

  • memory/2040-62-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/2040-63-0x0000000005AB0000-0x0000000005AB2000-memory.dmp
    Filesize

    8KB