Analysis

  • max time kernel
    97s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    22-10-2021 03:06

General

  • Target

    (??2)??, ???? ? ??????? ?? ??.xls

  • Size

    60KB

  • MD5

    0cbab6d9f5d8abb09fa32084a470e98c

  • SHA1

    d34c4fcd7084cfdae513d14c8748330547cdb508

  • SHA256

    623bd978bbbc88b13f2aa246ce3e1b0223845764ef29e94e81a977b7a5b3a036

  • SHA512

    d4f87f1cca26f71d27681467f489ffc6d4e2f036f4aed874730d9fff61194bb5dbef90f52369446b92e1e29ea47479eb62fc26b46d013873610af194d9959732

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\(__2)__, ____ _ _______ __ __.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:888
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1824

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/888-54-0x000000002F691000-0x000000002F694000-memory.dmp
      Filesize

      12KB

    • memory/888-55-0x0000000071201000-0x0000000071203000-memory.dmp
      Filesize

      8KB

    • memory/888-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/888-59-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1824-57-0x0000000000000000-mapping.dmp
    • memory/1824-58-0x000007FEFBA11000-0x000007FEFBA13000-memory.dmp
      Filesize

      8KB