Analysis

  • max time kernel
    147s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 20:29

General

  • Target

    3856caab815b80d3123ba3762087d7f84688fdf548a2b050c67b3efc7a41078d.xls

  • Size

    18.8MB

  • MD5

    9b87af8be92e18d2238ebd76dac75aa3

  • SHA1

    be0ba99afadb7555b9caf587e2dd37e4d7ee912d

  • SHA256

    3856caab815b80d3123ba3762087d7f84688fdf548a2b050c67b3efc7a41078d

  • SHA512

    18815de4db3091ea5d2f9d3794d635258b3c34c9f0139914a1762a430e29491e665f0237b3b99ece587d375299382822c4e6ddb2c497054f56b736f942c1476b

  • SSDEEP

    196608:skq1/JyNdYRrmZa71YdURtj6unFbUbqcCuqgqW:sM+FbUb8CB

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\3856caab815b80d3123ba3762087d7f84688fdf548a2b050c67b3efc7a41078d.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1044

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1044-54-0x000000002FFE1000-0x000000002FFE4000-memory.dmp

          Filesize

          12KB

        • memory/1044-55-0x0000000071881000-0x0000000071883000-memory.dmp

          Filesize

          8KB

        • memory/1044-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1044-57-0x000000007286D000-0x0000000072878000-memory.dmp

          Filesize

          44KB

        • memory/1044-58-0x00000000756A1000-0x00000000756A3000-memory.dmp

          Filesize

          8KB

        • memory/1044-59-0x000000007286D000-0x0000000072878000-memory.dmp

          Filesize

          44KB