Analysis

  • max time kernel
    172s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2022 21:27

General

  • Target

    2dc726b8aa47616b6315d486dd289ba3.xlsm

  • Size

    17KB

  • MD5

    2dc726b8aa47616b6315d486dd289ba3

  • SHA1

    0823f9ea4079f3c43fd79953bddcaf1a4d939f82

  • SHA256

    4b51506ee5dd8045f193ca519f96505266ce7108897e4ecee134e96bd95f8f54

  • SHA512

    e2401ae3b4e18e857a2330210d153fdbfeb4dcb31ae584b559fe716fac9a58ea98a446d61d9870b2b5a90feb156e9f8da40b6ec5f7f62fba92ded74b92010b75

  • SSDEEP

    384:HeEW2Vk1eKrNHj8f9NdNQQKKEM5CxSMDS2OQxEN7UIFhibbwBHtL:+EW2Vk0MWNMKEMb8TOhAWoXmL

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2dc726b8aa47616b6315d486dd289ba3.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\\SysWOW64\\rundll32.exe
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      PID:1408

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1408-97-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-73-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-1767-0x0000000000000000-mapping.dmp

  • memory/1408-127-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-125-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-71-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-69-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-99-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-81-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-101-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-85-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-87-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-89-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-91-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-93-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-95-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-123-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-121-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-83-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-103-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-105-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-107-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-109-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-111-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-113-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-115-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-117-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1408-119-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1768-55-0x0000000071741000-0x0000000071743000-memory.dmp

    Filesize

    8KB

  • memory/1768-58-0x0000000075531000-0x0000000075533000-memory.dmp

    Filesize

    8KB

  • memory/1768-54-0x000000002F021000-0x000000002F024000-memory.dmp

    Filesize

    12KB

  • memory/1768-57-0x000000007272D000-0x0000000072738000-memory.dmp

    Filesize

    44KB

  • memory/1768-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1768-1769-0x000000007272D000-0x0000000072738000-memory.dmp

    Filesize

    44KB