Analysis

  • max time kernel
    117s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    29-10-2021 08:06

General

  • Target

    MVSEACON KOBE.xlsx

  • Size

    349KB

  • MD5

    fc7daf6ca0e28139a632fd9c7dcd3fe1

  • SHA1

    49b48b54c2bc7570db20c27890a2726cc55c90f5

  • SHA256

    86104b114c8a2df3ff733fc9729d3c27953318807281735c21033705789d5a7b

  • SHA512

    b7fba001505e4855b65b82512cd1c573e645aa1a81180ef31f24f4fa4c74256f19bddb0ce54477b772dedfd57a7afe6e83e9235240bac7af6dd7a90d978f6492

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\MVSEACON KOBE.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:764

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/764-115-0x00007FF8DD160000-0x00007FF8DD170000-memory.dmp
    Filesize

    64KB

  • memory/764-116-0x00007FF8DD160000-0x00007FF8DD170000-memory.dmp
    Filesize

    64KB

  • memory/764-117-0x00007FF8DD160000-0x00007FF8DD170000-memory.dmp
    Filesize

    64KB

  • memory/764-118-0x00007FF8DD160000-0x00007FF8DD170000-memory.dmp
    Filesize

    64KB

  • memory/764-119-0x0000016C0D740000-0x0000016C0D742000-memory.dmp
    Filesize

    8KB

  • memory/764-121-0x00007FF8DD160000-0x00007FF8DD170000-memory.dmp
    Filesize

    64KB

  • memory/764-120-0x0000016C0D740000-0x0000016C0D742000-memory.dmp
    Filesize

    8KB

  • memory/764-122-0x0000016C0D740000-0x0000016C0D742000-memory.dmp
    Filesize

    8KB

  • memory/764-128-0x00007FF8DA490000-0x00007FF8DA4A0000-memory.dmp
    Filesize

    64KB

  • memory/764-129-0x00007FF8DA490000-0x00007FF8DA4A0000-memory.dmp
    Filesize

    64KB