Resubmissions

26-10-2021 18:23

211026-w1sp7saag4 8

Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    26-10-2021 18:23

General

  • Target

    DHL_Fattura-215467-9591.xls

  • Size

    55KB

  • MD5

    ed72f2a8346818ec6f2d799363169bc2

  • SHA1

    0cff3f5885da52e4004aba2ad5d4a849684690d4

  • SHA256

    a35b42d3fa543d26e5d807c3e4148d90ed52b2e76153b06a93740f04bc58dd9a

  • SHA512

    5cb6b19c140eb2a3f630b2163fa2e72568b6c16a7378f66072c592ffe1138926fa67b2b20e3e485dbc8f03caa40b63c7d732a91c8870daf30f04992d181cbd9c

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\DHL_Fattura-215467-9591.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1168

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1168-54-0x000000002F7C1000-0x000000002F7C4000-memory.dmp
    Filesize

    12KB

  • memory/1168-55-0x00000000719E1000-0x00000000719E3000-memory.dmp
    Filesize

    8KB

  • memory/1168-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1168-57-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB