Analysis

  • max time kernel
    4294178s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    29-03-2022 14:05

General

  • Target

    5bd66ab2a24a23d80d2f2a03965df7ce8a2de1f0ca1922d0846a006d96508642.xlsb

  • Size

    357KB

  • MD5

    56da90d2ce439a52f58bc425ec9ff8cb

  • SHA1

    be5735ab106498b2bc663cf62b8a1298b66f2f1d

  • SHA256

    5bd66ab2a24a23d80d2f2a03965df7ce8a2de1f0ca1922d0846a006d96508642

  • SHA512

    a7c2e735b0bb564dc1338d6027cb4551047418a6f1dd76bc2ff07c6e82c31396e003005bdb0ac19b2d99101f269f3fd96154f91814b1a23256da001445e7980f

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bemojo.com/ds/161120.gif

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\5bd66ab2a24a23d80d2f2a03965df7ce8a2de1f0ca1922d0846a006d96508642.xlsb
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1920

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1920-54-0x000000002F421000-0x000000002F424000-memory.dmp
    Filesize

    12KB

  • memory/1920-55-0x00000000713B1000-0x00000000713B3000-memory.dmp
    Filesize

    8KB

  • memory/1920-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1920-57-0x000000007239D000-0x00000000723A8000-memory.dmp
    Filesize

    44KB

  • memory/1920-58-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB