Analysis

  • max time kernel
    111s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 09:59

General

  • Target

    64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c.xls

  • Size

    937KB

  • MD5

    0fea640a7da27f365b3675f73626b9c9

  • SHA1

    fd4825f244e9c145486cb6930ad05695b9972668

  • SHA256

    64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c

  • SHA512

    c9a10288762f3f5a3fdff17f8dd8560e7a884f1b83f405c2e85c6c86e42f69a30841c13aa0f2ecfc55aed42995d7aeb8fe40415e423ed0a306d2e7d00883dfbf

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Signatures

  • TA505

    Cybercrime group active since 2015, responsible for families like Dridex and Locky.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c.xls
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\contract_.dll

    Filesize

    328KB

    MD5

    2b111f00ad27acb2e312c693e9901f54

    SHA1

    3af7391cb25b2ebcab1c5b014a61af7d4b718f1a

    SHA256

    90517af7a1a1a468bea6ea125f2f32ba021bfaa9593fda800067e1a47bc2228a

    SHA512

    73a022859d1874e57e51ed7780a656f3ee66cb9ddd14749adbe31f2e45c06af99b33ac465dfdb8ff32588d8f159e81682fb08721480a3b4e927d186c1e05cf78

  • memory/560-59-0x0000000000572000-0x0000000000576000-memory.dmp

    Filesize

    16KB

  • memory/560-79-0x00000000721CD000-0x00000000721D8000-memory.dmp

    Filesize

    44KB

  • memory/560-64-0x0000000000572000-0x0000000000576000-memory.dmp

    Filesize

    16KB

  • memory/560-58-0x0000000075271000-0x0000000075273000-memory.dmp

    Filesize

    8KB

  • memory/560-54-0x000000002FC11000-0x000000002FC14000-memory.dmp

    Filesize

    12KB

  • memory/560-60-0x0000000000572000-0x0000000000576000-memory.dmp

    Filesize

    16KB

  • memory/560-62-0x0000000000572000-0x0000000000576000-memory.dmp

    Filesize

    16KB

  • memory/560-61-0x0000000000572000-0x0000000000576000-memory.dmp

    Filesize

    16KB

  • memory/560-57-0x00000000721CD000-0x00000000721D8000-memory.dmp

    Filesize

    44KB

  • memory/560-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/560-65-0x0000000000572000-0x0000000000576000-memory.dmp

    Filesize

    16KB

  • memory/560-66-0x0000000000572000-0x0000000000576000-memory.dmp

    Filesize

    16KB

  • memory/560-67-0x0000000000572000-0x0000000000576000-memory.dmp

    Filesize

    16KB

  • memory/560-71-0x0000000000572000-0x0000000000576000-memory.dmp

    Filesize

    16KB

  • memory/560-55-0x00000000711E1000-0x00000000711E3000-memory.dmp

    Filesize

    8KB

  • memory/560-76-0x0000000010000000-0x0000000010053000-memory.dmp

    Filesize

    332KB

  • memory/560-77-0x00000000721CD000-0x00000000721D8000-memory.dmp

    Filesize

    44KB

  • memory/560-78-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/560-63-0x0000000000572000-0x0000000000576000-memory.dmp

    Filesize

    16KB