Analysis

  • max time kernel
    55s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    10-05-2021 05:58

General

  • Target

    Purchase Order-1245102021.xls

  • Size

    60KB

  • MD5

    c7bad1cde5a30aa2b665c62a1ebe3548

  • SHA1

    e4cb443f698d32c572274f379e52e2c8e6296846

  • SHA256

    8d6eb0ea0a37d5573bd7a306d12837a74dd2e68a597b42516784b3f2d23743e4

  • SHA512

    1b083b95391f77b04c9f991a69d22d2f8ff74b227f85891723384090ad90a22dd357d1b8ebf3820a0c15afba216468ea3774e574c7352404d99772bb8c20172a

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Purchase Order-1245102021.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1700

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1116-59-0x000000002FB01000-0x000000002FB04000-memory.dmp
      Filesize

      12KB

    • memory/1116-60-0x0000000071B01000-0x0000000071B03000-memory.dmp
      Filesize

      8KB

    • memory/1116-61-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1700-62-0x0000000000000000-mapping.dmp
    • memory/1700-63-0x000007FEFC301000-0x000007FEFC303000-memory.dmp
      Filesize

      8KB