Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    08-05-2021 18:03

General

  • Target

    scan of check 288206.xlsm

  • Size

    86KB

  • MD5

    fef6a1ca7797ac6833de5bdb49f17c10

  • SHA1

    13a53cbc65e4fef639f3b31948b79e4913b9239b

  • SHA256

    7bf750678ab5834bba278727bce90e0b719820601f888926da5ab1335fe2857f

  • SHA512

    730eab1d3ee0e066372d35bf5c9617e09515fdaba0fc9dafdd2cfab02d9d7909b0cefe520bb0de047a9f90e05bacc3c984e9528ed6cd1a9d20d25e19be1e2e12

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\scan of check 288206.xlsm"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1820-60-0x000000002FC11000-0x000000002FC14000-memory.dmp

    Filesize

    12KB

  • memory/1820-61-0x00000000716D1000-0x00000000716D3000-memory.dmp

    Filesize

    8KB

  • memory/1820-62-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1820-63-0x0000000005A60000-0x0000000005A62000-memory.dmp

    Filesize

    8KB