Resubmissions

14-07-2021 19:15

210714-kbf8zkt3qa 10

14-07-2021 12:29

210714-nbf5bw46ce 10

Analysis

  • max time kernel
    14s
  • max time network
    22s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    14-07-2021 12:29

General

  • Target

    dbt_ntf_1184293.xlsm

  • Size

    84KB

  • MD5

    afdd3ac1e245c015cd6703ac38f6cc06

  • SHA1

    6c5daf1541d2b05f5d6c99c2bc5a9bcff23688cf

  • SHA256

    0846910f2f2c0c686afab342cbb79965a115b35e41a0381819a0d10461d45c77

  • SHA512

    6c65d2a616397ed5645af8bb4a16dcadaaf9efa86d22b64509bad873eeb6086d7e9129eeee516f2d321771815b326dd858da7f13ad32721ce496cfc0d24300f3

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\dbt_ntf_1184293.xlsm"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:804

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/804-114-0x00007FF7F0830000-0x00007FF7F3DE6000-memory.dmp
    Filesize

    53.7MB

  • memory/804-115-0x00007FFA6EBC0000-0x00007FFA6EBD0000-memory.dmp
    Filesize

    64KB

  • memory/804-116-0x00007FFA6EBC0000-0x00007FFA6EBD0000-memory.dmp
    Filesize

    64KB

  • memory/804-117-0x00007FFA6EBC0000-0x00007FFA6EBD0000-memory.dmp
    Filesize

    64KB

  • memory/804-118-0x00007FFA6EBC0000-0x00007FFA6EBD0000-memory.dmp
    Filesize

    64KB

  • memory/804-121-0x00007FFA6EBC0000-0x00007FFA6EBD0000-memory.dmp
    Filesize

    64KB

  • memory/804-122-0x00007FFA8F710000-0x00007FFA907FE000-memory.dmp
    Filesize

    16.9MB

  • memory/804-123-0x00007FFA8D810000-0x00007FFA8F705000-memory.dmp
    Filesize

    31.0MB