Analysis

  • max time kernel
    151s
  • max time network
    209s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2022 21:27

General

  • Target

    55a0f2b3db0d1efd18321b7701c658b3.xls

  • Size

    33KB

  • MD5

    55a0f2b3db0d1efd18321b7701c658b3

  • SHA1

    8edc457ff5cbc5eef2e1e269702dac8c907c6402

  • SHA256

    4a65356586777494a89a788ae4bcbb4295c54e668f0a2f3170ecebefc801e4ca

  • SHA512

    583dfc22752983b806bc9d6e4ff873f2952923e66d5c35e8fd482b89c2eb045d65ffc4184b412ac9b238f73a5f7a8564ddfcd7233ac8f0d0e90216e6425e15d8

  • SSDEEP

    768:/ik3hOdsylKlgryzc4bNhZFGzE+cL2knAJp2Inur39U/8+:qk3hOdsylKlgryzc4bNhZFGzE+cL2knw

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\55a0f2b3db0d1efd18321b7701c658b3.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" https://products.office.com/zh-CN/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1736
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:406530 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1304
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    382d683007c8e7045687fb2864160395

    SHA1

    2a81220c2ca12c877955c941753b28cef8647ab3

    SHA256

    76bcc416a32dc55ea268a00cf69405aaa42cd6eafa99a41ec4d71c0205913769

    SHA512

    885d3cbd387394eef795c8b34a951fdd27691cc0678c5b4621ea5cc20cdcc19af01b7136f864b520148834b94e9a83184c98517d0448fc6e1ad55a8e17b315ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a06b41f8d7601d43cfabd32457d3516

    SHA1

    4739bb4a2180bb54d7e9f875c5cedcd29b41cf19

    SHA256

    46009a84552884f6efb2381cbb4d5119306a89da3e6222c00da548e0a28e9813

    SHA512

    85b497497c58f4e7e9919fb1f195d3758e67e8a4fdb731a658c32173eb17dbfedd214e608f90ecbc9a57ecf1b23b0994e23996d87fcb0f638c14c11a93d5fe3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c06071cc281ac4bcd57d4e9c3f003b9

    SHA1

    e82001c5848eb38fdc1bb7198a4d31ef2020c13a

    SHA256

    baf89f6c18915471224fa021fd27aa516308dc6fbf48e9e54088c6041f9600dd

    SHA512

    4129abfa77ae013b39fe44251958f175b9f058d4288f84e18234438b07bcaf19162af5bc6229ffda0d3c65ef6e96f86d6cd39b432d7ee7555e91c3f95b53cccf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f2686731aaf6ca1ff0aa29d8b03cbad

    SHA1

    049e62a7b94708fa1ca6c19196a3d7cc7da20ae9

    SHA256

    9e467cccfa219208d966df7a76004fbdeaa640b2bc0cbb52d84c811886e6c500

    SHA512

    05d3ca9671b64561854d55a827bafafdcf3f06d92bfb817a28283e5396242cb440a075f2ceb5c1ba7064787375c1e5484015a944238baf89056227ff142b5e9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8624c0a628af922b78aa655cc111c6f9

    SHA1

    7c25c5741c5302cc23cc405b8a4a03efb4d954b6

    SHA256

    48622dbccf5485e2c5bfd5d775243f68e4fee90234d868e332b65b65b1c85701

    SHA512

    5e09939274b9536759f7e10cf82491ad5d3dfb8734b35327414db0b8f779b23a3a8128ed2dca52bc31c92acc4726b51a0ece052071f108e176997ab299363199

  • memory/1356-84-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-68-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-57-0x0000000071E0D000-0x0000000071E18000-memory.dmp

    Filesize

    44KB

  • memory/1356-58-0x0000000074E01000-0x0000000074E03000-memory.dmp

    Filesize

    8KB

  • memory/1356-59-0x000000006C391000-0x000000006C393000-memory.dmp

    Filesize

    8KB

  • memory/1356-67-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-66-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-65-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-64-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-63-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-61-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-62-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-60-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-87-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-69-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-70-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-72-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-71-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-75-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-77-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-76-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-74-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-73-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-78-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-79-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-81-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-80-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-83-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-82-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-55-0x0000000070E21000-0x0000000070E23000-memory.dmp

    Filesize

    8KB

  • memory/1356-89-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-86-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-92-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1356-85-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-91-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-90-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-88-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-93-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-94-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-95-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-96-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-97-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-99-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-98-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-106-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-105-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-104-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-103-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-102-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-101-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-100-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-107-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-109-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-108-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-110-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-111-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-112-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-113-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-114-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-54-0x000000002FB91000-0x000000002FB94000-memory.dmp

    Filesize

    12KB

  • memory/1356-115-0x0000000000447000-0x0000000000452000-memory.dmp

    Filesize

    44KB

  • memory/1356-124-0x0000000071E0D000-0x0000000071E18000-memory.dmp

    Filesize

    44KB

  • memory/1764-116-0x0000000068691000-0x0000000068694000-memory.dmp

    Filesize

    12KB

  • memory/1764-120-0x0000000071E0D000-0x0000000071E18000-memory.dmp

    Filesize

    44KB

  • memory/1764-121-0x0000000071E0D000-0x0000000071E18000-memory.dmp

    Filesize

    44KB